• 제목/요약/키워드: Ad Creation

검색결과 27건 처리시간 0.021초

초기 생성과 사용자 추가를 고려한 VANET 클라우드 아키텍처 (Supplements an Initial Creation and User Addition in VANET Cloud Architecture)

  • 김태형;송주석
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제3권12호
    • /
    • pp.449-454
    • /
    • 2014
  • 무인 자동차의 시대가 도래하면서, 차량 간 통신 네트워크인 Vehicular Ad hoc NETwork(VANET)의 중요성이 점점 더해지고 있다. 지금까지 VANET의 연구가 많이 진행되었으나, 기존의 연구는 각 자동차의 통신적인 측면만 연구하고, 차량에 설치된 On Board Unit(OBU)의 계산 능력, 저장 공간 등을 효율적으로 사용하지 못하는 한계점이 있었다. 그러나 최근 나온 VANET cloud computing(VCC) 개념은 높아진 각 자동차의 능력을 효율적으로 이용하여, 유용하게 사용하는 것에 초점을 맞추어 이러한 한계점을 해결하였다. 그러나 지금까지 진행된 연구에서는 VCC의 초기 클라우드 생성 부분과 사용자 추가 부분의 연구가 미흡한 실정이다. 본 논문은 이러한 부분을 보완한, VCC 아키텍처를 제안한다.

Ad-Hoc환경에서 효율적인 라우팅 및 인증 기술에 관한 연구 (A Study on Efficient Routing and Authentication Scheme in Ad-Hoc Environment)

  • 강서일;이임영
    • 한국멀티미디어학회논문지
    • /
    • 제11권8호
    • /
    • pp.1121-1128
    • /
    • 2008
  • Ad-Hoc네트워크는 무선 통신의 디바이스들로 구성된다. 따라서 네트워크의 구성은 동적이며, 통신 경로의 변경이 필수적으로 요구된다. 이로 인해 안전한 라우팅 경로와 인증기술에 대한 연구가 필수적이다. 본 논문은 Ad-Hoc 환경에서 안전한 라우팅과 인증 방안에 대하여 제안하며, Ad-Hoc 네트워크와 무선랜을 연결하여 사용자가 이기종 네트워크 서비스를 제공받을 수 있는 방안을 제시한다. Ad-Hoc네트워크의 라우팅 방식의 경우 기존 연구에서는 구성 디바이스가 탈퇴하면 다시 라우팅이 필요하지만 본 연구에서는 홉 수를 이용한 우회 경로를 제공한다. Ad-Hoc네트워크에서 안전한 사용자 인증 및 라우팅 경로의 설정으로 유비쿼터스 서비스를 제공한다.

  • PDF

Biotechnological Approaches in Sericultural Science and Technology of Uzbekistan

  • Madyarov Shukhrat R.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • 제11권1호
    • /
    • pp.13-19
    • /
    • 2005
  • Biotechnological researches in Central Asian Research Institute of Sericulture were developed since 1981 when laboratory of artificial diets for mulberry silk­worm was created. The researches were directed not only to creation of accessible artificial diets (AD) for off-season mass rearing of economical beneficial insect and for industrialization of sericulture but also to obtaining of easy reproducible source of animal proteins, carbohydrates, lipids, enzymes, enzymes inhibitors and other metabolites - bioresource for manufacture of oriental medicine preparations. Space experiments with silkworms became possible with use of AD. These experiments used mulberry silkworm as high effective board test organism with outstanding developmental, reproductive and transgenic properties having impor­tant significance in future of cosmonautics. Introduction to practice of bioprotective and ecologically pure method of drying and sterilizing of green cocoons and by-products of silk manufacture allows to increase efficiency of cocoons reeling technology as well as to preserve nativity of biological active substances in mulberry silkworm pupae that is unachievable by traditional methods of raw material processing. New spheres of application of two important silk proteins - fibroin and sericin in medicine, cosmetics, for bio- and nanotechnology are opening with use of biotechnological approaches. At present the achievements and experience of R & D in these fields are used in creation of modern pests biocontrol agents. Schemes of efficient processing of cocoon raw material, by-products and wastes of sericulture and cocoon processing are devel- Institute of Physiology and Biophysics, Uzbek Academy of Sciences, I, Niyazov street, 700095, Tashkent, Uzbekistan. oped for obtaining of traditional and new consumer products.

무선 메쉬 네트워크 환경에서 효율적인 다중 홉 전달 기법 (An Effective Multi-hop Relay Algorithm in Wireless Mesh Network)

  • 김영안;박철현;홍충선
    • 한국통신학회논문지
    • /
    • 제31권10B호
    • /
    • pp.872-882
    • /
    • 2006
  • 무선 메쉬 네트워크(Wireless Mesh Network) 기술은 유선과 비슷한 전송속도를 갖은 무선 통신 기술을 이용해서 문선 백본망으로 사용하는 기술을 의미하며, 토폴로지는 메쉬 형태를 갖는다. 이러한 형태는 Ad-hoc네트워크와 유사란 점을 가지고 있지만, 운용목적과 내부동작에서 다르기 때문에 경로 설정 방법과 경로를 설정하기 위한 메트릭이 요구된다. 본 논문에서는 데이터를 전달하기 위한 루프가 없는 효율적인 다중 흡 전달을 위한 다중 경로생성 방법과 Hop-by-hop 라우팅기법을 기반으로 경로설정을 하고 물리적인 링크의 성능과 다중 홉 전달을 위한 메트릭(ETR : Expected Transmission Rate)을 제안한다.

ICSID 상소제도의 도입 필요성 (The Necessity for Introduction of ICSID Appellate System)

  • 김용일
    • 한국중재학회지:중재연구
    • /
    • 제29권4호
    • /
    • pp.187-210
    • /
    • 2019
  • This article examines the necessity for the introduction of an ICSID Appellate System. In comparison with the WTO appellate system, the ICSID ad hoc Committee has a very limited mandate. An annulment inquiry under the ICSID arbitration system barely focuses on whether the arbitral decision resulted from a justifiable process. As long as there is procedural legitimacy, the resulting awards remain unaffected under the annulment procedure, irrespective of mistakes of fact or law. In contrast, in the WTO DSS the AB substantively reviews panel rulings and suggestions that are founded on any deficiency of objectivity or error in the interpretation of a particular WTO provision. This defect intrinsic in the annulment procedure could cause injustice to a party earnestly interested in correcting recognized misapplication of law by ICSID tribunals. Accordingly, the establishment of an appellate system would result in a more substantive and procedural review of awards. The creation of such an ICSID appellate system would ensure thorough scrutiny of the decisions of the tribunal of first instance, leading to better reasoned outcomes. This could lead to a crystallization of predictability in investment relations. The end result would be that fairness, clarity, reliability, and legality in the ICSID adjudicative process would be unassailable, to the advantage of all the contracting parties.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Perceptional Change of a New Product, DMB Phone

  • Kim, Ju-Young;Ko, Deok-Im
    • 마케팅과학연구
    • /
    • 제18권3호
    • /
    • pp.59-88
    • /
    • 2008
  • Digital Convergence means integration between industry, technology, and contents, and in marketing, it usually comes with creation of new types of product and service under the base of digital technology as digitalization progress in electro-communication industries including telecommunication, home appliance, and computer industries. One can see digital convergence not only in instruments such as PC, AV appliances, cellular phone, but also in contents, network, service that are required in production, modification, distribution, re-production of information. Convergence in contents started around 1990. Convergence in network and service begins as broadcasting and telecommunication integrates and DMB(digital multimedia broadcasting), born in May, 2005 is the symbolic icon in this trend. There are some positive and negative expectations about DMB. The reason why two opposite expectations exist is that DMB does not come out from customer's need but from technology development. Therefore, customers might have hard time to interpret the real meaning of DMB. Time is quite critical to a high tech product, like DMB because another product with same function from different technology can replace the existing product within short period of time. If DMB does not positioning well to customer's mind quickly, another products like Wibro, IPTV, or HSPDA could replace it before it even spreads out. Therefore, positioning strategy is critical for success of DMB product. To make correct positioning strategy, one needs to understand how consumer interprets DMB and how consumer's interpretation can be changed via communication strategy. In this study, we try to investigate how consumer perceives a new product, like DMB and how AD strategy change consumer's perception. More specifically, the paper segment consumers into sub-groups based on their DMB perceptions and compare their characteristics in order to understand how they perceive DMB. And, expose them different printed ADs that have messages guiding consumer think DMB in specific ways, either cellular phone or personal TV. Research Question 1: Segment consumers according to perceptions about DMB and compare characteristics of segmentations. Research Question 2: Compare perceptions about DMB after AD that induces categorization of DMB in direction for each segment. If one understand and predict a direction in which consumer perceive a new product, firm can select target customers easily. We segment consumers according to their perception and analyze characteristics in order to find some variables that can influence perceptions, like prior experience, usage, or habit. And then, marketing people can use this variables to identify target customers and predict their perceptions. If one knows how customer's perception is changed via AD message, communication strategy could be constructed properly. Specially, information from segmented customers helps to develop efficient AD strategy for segment who has prior perception. Research framework consists of two measurements and one treatment, O1 X O2. First observation is for collecting information about consumer's perception and their characteristics. Based on first observation, the paper segment consumers into two groups, one group perceives DMB similar to Cellular phone and the other group perceives DMB similar to TV. And compare characteristics of two segments in order to find reason why they perceive DMB differently. Next, we expose two kinds of AD to subjects. One AD describes DMB as Cellular phone and the other Ad describes DMB as personal TV. When two ADs are exposed to subjects, consumers don't know their prior perception of DMB, in other words, which subject belongs 'similar-to-Cellular phone' segment or 'similar-to-TV' segment? However, we analyze the AD's effect differently for each segment. In research design, final observation is for investigating AD effect. Perception before AD is compared with perception after AD. Comparisons are made for each segment and for each AD. For the segment who perceives DMB similar to TV, AD that describes DMB as cellular phone could change the prior perception. And AD that describes DMB as personal TV, could enforce the prior perception. For data collection, subjects are selected from undergraduate students because they have basic knowledge about most digital equipments and have open attitude about a new product and media. Total number of subjects is 240. In order to measure perception about DMB, we use indirect measurement, comparison with other similar digital products. To select similar digital products, we pre-survey students and then finally select PDA, Car-TV, Cellular Phone, MP3 player, TV, and PSP. Quasi experiment is done at several classes under instructor's allowance. After brief introduction, prior knowledge, awareness, and usage about DMB as well as other digital instruments is asked and their similarities and perceived characteristics are measured. And then, two kinds of manipulated color-printed AD are distributed and similarities and perceived characteristics for DMB are re-measured. Finally purchase intension, AD attitude, manipulation check, and demographic variables are asked. Subjects are given small gift for participation. Stimuli are color-printed advertising. Their actual size is A4 and made after several pre-test from AD professionals and students. As results, consumers are segmented into two subgroups based on their perceptions of DMB. Similarity measure between DMB and cellular phone and similarity measure between DMB and TV are used to classify consumers. If subject whose first measure is less than the second measure, she is classified into segment A and segment A is characterized as they perceive DMB like TV. Otherwise, they are classified as segment B, who perceives DMB like cellular phone. Discriminant analysis on these groups with their characteristics of usage and attitude shows that Segment A knows much about DMB and uses a lot of digital instrument. Segment B, who thinks DMB as cellular phone doesn't know well about DMB and not familiar with other digital instruments. So, consumers with higher knowledge perceive DMB similar to TV because launching DMB advertising lead consumer think DMB as TV. Consumers with less interest on digital products don't know well about DMB AD and then think DMB as cellular phone. In order to investigate perceptions of DMB as well as other digital instruments, we apply Proxscal analysis, Multidimensional Scaling technique at SPSS statistical package. At first step, subjects are presented 21 pairs of 7 digital instruments and evaluate similarity judgments on 7 point scale. And for each segment, their similarity judgments are averaged and similarity matrix is made. Secondly, Proxscal analysis of segment A and B are done. At third stage, get similarity judgment between DMB and other digital instruments after AD exposure. Lastly, similarity judgments of group A-1, A-2, B-1, and B-2 are named as 'after DMB' and put them into matrix made at the first stage. Then apply Proxscal analysis on these matrixes and check the positional difference of DMB and after DMB. The results show that map of segment A, who perceives DMB similar as TV, shows that DMB position closer to TV than to Cellular phone as expected. Map of segment B, who perceive DMB similar as cellular phone shows that DMB position closer to Cellular phone than to TV as expected. Stress value and R-square is acceptable. And, change results after stimuli, manipulated Advertising show that AD makes DMB perception bent toward Cellular phone when Cellular phone-like AD is exposed, and that DMB positioning move towards Car-TV which is more personalized one when TV-like AD is exposed. It is true for both segment, A and B, consistently. Furthermore, the paper apply correspondence analysis to the same data and find almost the same results. The paper answers two main research questions. The first one is that perception about a new product is made mainly from prior experience. And the second one is that AD is effective in changing and enforcing perception. In addition to above, we extend perception change to purchase intention. Purchase intention is high when AD enforces original perception. AD that shows DMB like TV makes worst intention. This paper has limitations and issues to be pursed in near future. Methodologically, current methodology can't provide statistical test on the perceptual change, since classical MDS models, like Proxscal and correspondence analysis are not probability models. So, a new probability MDS model for testing hypothesis about configuration needs to be developed. Next, advertising message needs to be developed more rigorously from theoretical and managerial perspective. Also experimental procedure could be improved for more realistic data collection. For example, web-based experiment and real product stimuli and multimedia presentation could be employed. Or, one can display products together in simulated shop. In addition, demand and social desirability threats of internal validity could influence on the results. In order to handle the threats, results of the model-intended advertising and other "pseudo" advertising could be compared. Furthermore, one can try various level of innovativeness in order to check whether it make any different results (cf. Moon 2006). In addition, if one can create hypothetical product that is really innovative and new for research, it helps to make a vacant impression status and then to study how to form impression in more rigorous way.

  • PDF

CT-26 대장암 세포에서 Dominant Negative ATM 유전자에 의하여 유도되는 세포자멸사의 경로 (Apoptotic Pathway Induced by Dominant Negative ATM Gene in CT-26 Colon Cancer Cells)

  • 이정창;이호근;김선영;이대열;황평한;박진우
    • Clinical and Experimental Pediatrics
    • /
    • 제46권7호
    • /
    • pp.679-686
    • /
    • 2003
  • 목 적 : AT는 드물게 발생하는 상염색체성 열성질환으로, 소뇌의 퇴화에 의한 운동장애와, 암 발생의 소인이 증가하는 등 많은 임상적 징후가 보인다. AT 질환을 유발하는 ATM 유전자는 DNA 손상시 세포주기 정지를 유도시키지 못하며, 방사선 조사 후 세포 생존력을 유지시키지 못하여 세포자멸사를 유도하게 된다. 따라서 암세포에 DN-ATM 유전자를 발현시켜 AT 세포의 표현형으로 변화시킨다면, 이러한 암세포는 방사선에 의해 유도되는 세포자멸사가 훨씬 더 증가된다. 그러나 지금까지 ATM 세포에서 방사선에 의해 야기되는 세포자멸사 경로는 밝혀져 있지 않다. 그러므로 본 연구에서는 DN-ATM이 발현되는 CT-26 대장암 세포를 이용하여 방사선 조사 후에 유도되는 세포자 멸사 경로를 구명하고자 하였다. 방 법 : DN-ATM 아데노바이러스(Ad/DN-ATM)와 표식 유전자 GFP만을 함유한 대조 아데노바이러스(Ad/GFP)를 제작하여 CT-26 세포에 감염시켰다. DN-ATM이 발현되는 CT-26세포에서 방사선 조사로 유도되는 세포자멸사 경로는 [$^3H$]-thymidine assay, DNA fragmentation, 및 Western immunoblot analysis으로 실험하였다. 결 과 : 실험 결과에서 방사선 조사 후 세포의 성장이 감소하는 것으로 보아 CT-26 대장암 세포가 AT 환자에서 보여지는 표현형으로 변화되었다는 것을 보여주었고, 방사선 조사에 의한 세포자멸사가 유도되었다. 방사선 조사 후 시간이 지날수록 Bcl-2의 발현이 감소되고, Bax의 발현이 증가하며, caspase 9, caspase 3 및 PARP가 활성화되었다. 결 론: 이러한 실험 결과들은 DN-ATM이 발현되고 있는 CT-26 세포에서 방사선 조사 후 야기되는 세포자멸사 경로는 미토콘드리아를 통하여 caspase 9, caspase 3와 PARP의 활성에 의해 일어나는 세포자멸사임을 시사한다.

커뮤니티 기반의 유비쿼터스 네트워크 환경에서 안전한 커뮤니티 생성 권한 위임 방안 (Authority Delegation Scheme for Secure Social Community Creation in Community-Based Ubiquitous Networks)

  • 노효선;정수환
    • 대한전자공학회논문지TC
    • /
    • 제47권1호
    • /
    • pp.91-98
    • /
    • 2010
  • 본 논문은 커뮤니티 기반의 유비쿼터스 네트워크에서 대리 서명 기법을 적용한 커뮤니티 멤버들 간의 상호 인증 기법 및 안전한 커뮤니티 생성 권한 위임 기법을 제안한다. 커뮤니티 기반의 유비쿼터스 네트워크에서는 사용자가 필요로 하는 네트워크 서비스 및 응용서비스를 제공해주기 위해 다양한 상황인식 정보가 수집 되고 활용된다. 또한 사용자는 학업, 게임, 정보 공유, 사업, 회의 등의 다양한 목적에 의해 다양한 커뮤니티를 생성할 수 있다. 그러나 커뮤니티 기반의 유비쿼터스 네트워크의 경우 공격자에 의해 상황인식 정보가 위조 및 도용되어 악의적인 목적으로 사용될 수 있다. 또한 악의적인 목적으로 커뮤니티를 생성할 수 있다. 제안하는 기법은 위임 서명 기법을 이용하여 커뮤니티 멤버들 간의 상호 인증 및 비밀 키를 교환 할 수 있도록 지원하고, 안전하게 커뮤니티 생성 권한을 위임할 수 있도록 하였다. 또한 기존 RSA 서명 기법과의 비교 분석을 통해 전체 계산 시간이 감소함을 확인하였다.