• 제목/요약/키워드: Addresses

검색결과 2,637건 처리시간 0.028초

Factors affecting beef quality and nutrigenomics of intramuscular adipose tissue deposition

  • Myunggi Baik;Jaesung Lee;Sang Yeob Kim;Kamburawala Kankanamge Tharindu Namal Ranaweera
    • Animal Bioscience
    • /
    • 제36권2_spc호
    • /
    • pp.350-363
    • /
    • 2023
  • Beef quality is characterized by marbling (marbling degree and marbling fineness), physiochemical (shear force, meat color, fat color, texture, and maturity), and sensory (tenderness, flavor, juiciness, taste, odor, and appearance) traits. This paper summarizes and addresses beef-quality characteristics and the beef-grading systems in Korea, Japan, the USA, and Australia. This paper summarizes recent research progresses on the genetic and nutritional factors that affect beef quality. Intramuscular (i.m.) adipose tissue deposition or marbling is a major determinant of beef quality. This paper addresses the mechanisms of i.m. adipose tissue deposition focused on adipogenesis and lipogenesis. We also address selected signaling pathways associated with i.m. adipose tissue deposition. Nutrients contribute to the cellular response and phenotypes through gene expression and metabolism. This paper addresses control of gene expression through several nutrients (carbohydrates, fat/fatty acids, vitamins, etc.) for i.m. adipose tissue deposition. Several transcription factors responsible for gene expression via nutrients are addressed. We introduce the concept of genome-based precision feeding in Korean cattle.

Distributed Borrowing Addressing Scheme for ZigBee/IEEE 802.15.4 Wireless Sensor Networks

  • Park, Sung-Jin;Lee, Eun-Ju;Ryu, Jae-Hong;Joo, Seong-Soon;Kim, Hyung-Seok
    • ETRI Journal
    • /
    • 제31권5호
    • /
    • pp.525-533
    • /
    • 2009
  • This paper proposes a distributed borrowing addressing (DIBA) scheme to solve problems of failure in address assignments resulting from limited tree depth and width when the distributed address assignment mechanism is used in a ZigBee/IEEE 802.15.4 wireless sensor network. DIBA is a method of borrowing addresses from neighbor nodes for newly entering nodes and assigning the borrowed addresses. Its network or sensing coverage can increase with almost the same overhead as the existing method. DIBA is a simple and lightweight means of addressing and routing, making it suitable for wireless sensor networks. Simulations showed that DIBA is a distributed addressing scheme with consistently excellent performance.

Locating Destination Address Block On Thai Envelopes

  • Chanpongsae, Worapote;Kumhom, Pinti;Chamnongthai, Kosin
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -1
    • /
    • pp.192-195
    • /
    • 2002
  • About 90% of Thai-style addresses have similar features; e.g. the beginning of each address line is diagonal. In this paper, we propose a method for locating destination address block (DAB) on Thai envelopes based on features of Thai-style addresses. Firstly, we decompose image into smaller blocks and remove all blocks not meeting criteria. Secondly, we search for the DAB candidates. Lastly, heuristic rules and typical features are applied to identify the destination address block. Experimental results using 2,700 envelopes of handwritten and machine printed Thai envelopes show a successful address extraction rate of 91%.

  • PDF

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • 제6권4호
    • /
    • pp.56-59
    • /
    • 2017
  • In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

자동차 동력전달용 일체 벨트구동계의 동특성 해석 (Dynamic Analysis of Automotive Belt Drive Systems)

  • 오석일;송재수;김성원
    • 한국자동차공학회논문집
    • /
    • 제4권6호
    • /
    • pp.109-120
    • /
    • 1996
  • Serpentine belt drive system offers the advantages of light weigh, low cost, quientness, and efficiency. Since these belts are typically longer than conventional belts, a tensioner component is added to maintain acceptable belt tension levels and make no slippage between pulleys and belts. This paper addresses the modeling and analysis of the automotive belt drive systems and also addresses the predicton of slippage on rotational modes. Vibration characteristics are determined from the eigenvalue problem governing the free response. Under certain engine operating conditions, the dynamic tension fluctuations may be sufficient to cause the belt to slip on particular accessory pulleys, It is found that this slippage can be reduced by adding the tensioner component from the analysis of belt tension and belt compression.

  • PDF

모바일 기기용 햅틱스를 위한 센서 및 구동기

  • 김상연
    • 한국HCI학회:학술대회논문집
    • /
    • 한국HCI학회 2009년도 학술대회
    • /
    • pp.1683-1687
    • /
    • 2009
  • 본 논문에서는 모바일기기에 적용가능한 햅틱 액츄에이터들을 제시한다. 모바일 디바이스에서 햅틱감각을 전달하기 위하여 동작주파수, 자극의 세기 뿐 아니라 크기나 전력소모까지도 고려해야 한다. 그러므로 현재까지 많은 모바일 기기에서는 햅틱감각을 생성하기 위하여 크기가 작고 쉽게 장착가능한 진동모터를 많이 사용하고 있다. 본 논문에서는 진동 모터와 다양한 햅틱 감각을 생성할 수 있는 햅틱 액츄에이터들에 대하여 소개한다.

  • PDF

초고속 통신망에서 비디오 컨퍼런싱을 위한 다중 멀티캐스트 서버 (Multi-Multicast Server for Video Conferencing on Information Super Highway)

  • 안상준;이승로;한선영
    • 한국정보처리학회논문지
    • /
    • 제3권7호
    • /
    • pp.1858-1867
    • /
    • 1996
  • 본 논문은 초고속 통신망에서 비디오 컨퍼런싱을 위한 플랫폼을 나타낸다. 이플 랫폼은 ATM(Asynchronous Transfer Mode) 망 상에서 IP 멀티캐스트 데이타를 멀티캐 스팅하기 위해 다중 멀티채스트 서버를 이용한다. 본 논문에서 제안한 MARS(Multicast Address ResolutionServer)를 사용하여 D class IP 주소를 ATM 주소와 매핑하고, 또한 하나의 MCS(MultiCast Server)의 다운에 대한 처리를 수행 하도록 한다. 기존에 제안 된 하나의 MCS 사용 시 문제시 되던 병목현상을 해결한다.

  • PDF

Interval을 이용한 Conditional Constraints의 Propagation 알고리듬 (A PROPAGATION ALGORITHM FOR INTERVAL-BASED CONDITIONAL CONSTRAINTS)

  • 김경택
    • 대한산업공학회지
    • /
    • 제20권1호
    • /
    • pp.133-146
    • /
    • 1994
  • Conditional constraints are frequently used to represent relations. To use these conditional constraints, it is necessary to develop an appropriate logic in which these conditional constraints can be represented and manipulated. Nevertheless, there has been little research that addresses interval-based conditional constraints. The proposed approach addresses the use of conditional constraints involving intervals in constraint networks. Two algorithms are presented: (1) a propagation algorithm for an interval-based conditional constraint, which is similar to one for an exact-value conditional constraint; (2) a propagation algorithm for interval-based conditional constraints which satisfy some conditions. The former can be applied to any conditional constraint. However, with the former algorithm, conditional constraints are usually categorized into the cases that they cannot be propagated. After investigating several methods in which most conditional constraints can be propagated, we propose the latter algorithm under certain condition that usually results in smaller resulting design space comparing to the former.

  • PDF

WAN 실시간 전송시스템의 압축을 통한 전송효과 분석 (Transaction effect analysis through Compressing WAN Realtime Transfer system)

  • 박인순;박인정
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1999년도 추계종합학술대회 논문집
    • /
    • pp.1033-1036
    • /
    • 1999
  • In storage technology it is desirable to have greater storage capacity at lower costs. Data compression addresses these demands by reducing the amount of data that must be stored to a given size of media, thus lowering the cost of that storage device. In data compressions it is desirable to have faster transfer rates at lower costs. Data compression addresses these demands by reducing the amounts of data that must be transferred over a media with a fixed bandwidth, thus reducing the connection the. Data compression also reduces the media bandwidth required to transfer a fixed amount of data with a fixed quality of service, thus reducing the costs on this service.

  • PDF

Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • 제5권4호
    • /
    • pp.54-56
    • /
    • 2016
  • Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.