• Title/Summary/Keyword: Addresses

Search Result 2,577, Processing Time 0.029 seconds

Factors affecting beef quality and nutrigenomics of intramuscular adipose tissue deposition

  • Myunggi Baik;Jaesung Lee;Sang Yeob Kim;Kamburawala Kankanamge Tharindu Namal Ranaweera
    • Animal Bioscience
    • /
    • v.36 no.2_spc
    • /
    • pp.350-363
    • /
    • 2023
  • Beef quality is characterized by marbling (marbling degree and marbling fineness), physiochemical (shear force, meat color, fat color, texture, and maturity), and sensory (tenderness, flavor, juiciness, taste, odor, and appearance) traits. This paper summarizes and addresses beef-quality characteristics and the beef-grading systems in Korea, Japan, the USA, and Australia. This paper summarizes recent research progresses on the genetic and nutritional factors that affect beef quality. Intramuscular (i.m.) adipose tissue deposition or marbling is a major determinant of beef quality. This paper addresses the mechanisms of i.m. adipose tissue deposition focused on adipogenesis and lipogenesis. We also address selected signaling pathways associated with i.m. adipose tissue deposition. Nutrients contribute to the cellular response and phenotypes through gene expression and metabolism. This paper addresses control of gene expression through several nutrients (carbohydrates, fat/fatty acids, vitamins, etc.) for i.m. adipose tissue deposition. Several transcription factors responsible for gene expression via nutrients are addressed. We introduce the concept of genome-based precision feeding in Korean cattle.

Distributed Borrowing Addressing Scheme for ZigBee/IEEE 802.15.4 Wireless Sensor Networks

  • Park, Sung-Jin;Lee, Eun-Ju;Ryu, Jae-Hong;Joo, Seong-Soon;Kim, Hyung-Seok
    • ETRI Journal
    • /
    • v.31 no.5
    • /
    • pp.525-533
    • /
    • 2009
  • This paper proposes a distributed borrowing addressing (DIBA) scheme to solve problems of failure in address assignments resulting from limited tree depth and width when the distributed address assignment mechanism is used in a ZigBee/IEEE 802.15.4 wireless sensor network. DIBA is a method of borrowing addresses from neighbor nodes for newly entering nodes and assigning the borrowed addresses. Its network or sensing coverage can increase with almost the same overhead as the existing method. DIBA is a simple and lightweight means of addressing and routing, making it suitable for wireless sensor networks. Simulations showed that DIBA is a distributed addressing scheme with consistently excellent performance.

Locating Destination Address Block On Thai Envelopes

  • Chanpongsae, Worapote;Kumhom, Pinti;Chamnongthai, Kosin
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.192-195
    • /
    • 2002
  • About 90% of Thai-style addresses have similar features; e.g. the beginning of each address line is diagonal. In this paper, we propose a method for locating destination address block (DAB) on Thai envelopes based on features of Thai-style addresses. Firstly, we decompose image into smaller blocks and remove all blocks not meeting criteria. Secondly, we search for the DAB candidates. Lastly, heuristic rules and typical features are applied to identify the destination address block. Experimental results using 2,700 envelopes of handwritten and machine printed Thai envelopes show a successful address extraction rate of 91%.

  • PDF

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.6 no.4
    • /
    • pp.56-59
    • /
    • 2017
  • In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

Dynamic Analysis of Automotive Belt Drive Systems (자동차 동력전달용 일체 벨트구동계의 동특성 해석)

  • 오석일;송재수;김성원
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.4 no.6
    • /
    • pp.109-120
    • /
    • 1996
  • Serpentine belt drive system offers the advantages of light weigh, low cost, quientness, and efficiency. Since these belts are typically longer than conventional belts, a tensioner component is added to maintain acceptable belt tension levels and make no slippage between pulleys and belts. This paper addresses the modeling and analysis of the automotive belt drive systems and also addresses the predicton of slippage on rotational modes. Vibration characteristics are determined from the eigenvalue problem governing the free response. Under certain engine operating conditions, the dynamic tension fluctuations may be sufficient to cause the belt to slip on particular accessory pulleys, It is found that this slippage can be reduced by adding the tensioner component from the analysis of belt tension and belt compression.

  • PDF

모바일 기기용 햅틱스를 위한 센서 및 구동기

  • Kim, Sang-Youn
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.1683-1687
    • /
    • 2009
  • This paper addresses a haptic actuator which can be applied to mobile devices. For haptic feedback in mobile devices, we have to consider not only stimulating force and frequency but also the size and the power consumption of a haptic module. Thus far, vibration motors have been widely used in mobile devices to provide tactile sensation. The reason is that a vibration motor is small enough to be inserted into a mobile device. This paper addresses vibrotactile actuators and other haptic actuators which can generate a wide variety of tactile sensations.

  • PDF

Multi-Multicast Server for Video Conferencing on Information Super Highway (초고속 통신망에서 비디오 컨퍼런싱을 위한 다중 멀티캐스트 서버)

  • An, Sang-Jun;Lee, Seung-Ro;Han, Seon-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1858-1867
    • /
    • 1996
  • This paper describes a platform for video conferencing on Information Super Highway. In this paper we de-sign a Multi-Multicast Server(MCS) and the platform. The platform uses Multi-MultiCast Server for multitasking IP Multicast data on IP over ATM. Based on Multicast Address Resolution Server (AMRS) which was proposed in this paper the platform maps from D class IP addresses to ATM addresses. MARS handles a recovery in case of MCS down. This paper also presents a solving mechanism for handling botteneck by using the MCS.

  • PDF

A PROPAGATION ALGORITHM FOR INTERVAL-BASED CONDITIONAL CONSTRAINTS (Interval을 이용한 Conditional Constraints의 Propagation 알고리듬)

  • Kim, Kyeong-Taek
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.20 no.1
    • /
    • pp.133-146
    • /
    • 1994
  • Conditional constraints are frequently used to represent relations. To use these conditional constraints, it is necessary to develop an appropriate logic in which these conditional constraints can be represented and manipulated. Nevertheless, there has been little research that addresses interval-based conditional constraints. The proposed approach addresses the use of conditional constraints involving intervals in constraint networks. Two algorithms are presented: (1) a propagation algorithm for an interval-based conditional constraint, which is similar to one for an exact-value conditional constraint; (2) a propagation algorithm for interval-based conditional constraints which satisfy some conditions. The former can be applied to any conditional constraint. However, with the former algorithm, conditional constraints are usually categorized into the cases that they cannot be propagated. After investigating several methods in which most conditional constraints can be propagated, we propose the latter algorithm under certain condition that usually results in smaller resulting design space comparing to the former.

  • PDF

Transaction effect analysis through Compressing WAN Realtime Transfer system (WAN 실시간 전송시스템의 압축을 통한 전송효과 분석)

  • 박인순;박인정
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.1033-1036
    • /
    • 1999
  • In storage technology it is desirable to have greater storage capacity at lower costs. Data compression addresses these demands by reducing the amount of data that must be stored to a given size of media, thus lowering the cost of that storage device. In data compressions it is desirable to have faster transfer rates at lower costs. Data compression addresses these demands by reducing the amounts of data that must be transferred over a media with a fixed bandwidth, thus reducing the connection the. Data compression also reduces the media bandwidth required to transfer a fixed amount of data with a fixed quality of service, thus reducing the costs on this service.

  • PDF

Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.5 no.4
    • /
    • pp.54-56
    • /
    • 2016
  • Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.