• Title/Summary/Keyword: Application protocol

Search Result 1,497, Processing Time 0.026 seconds

Software Development Education through Developing a usable Multiplayer Online Game (다중 사용자 온라인 게임 개발을 통한 소프트웨어 개발 교육)

  • Yoon, Ilmi;Ng, Gary;Kwon, Oh Young
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.4 no.2
    • /
    • pp.38-45
    • /
    • 2012
  • Building a game has been used as effective and attractive way of teaching computer science. Building a usable Multi-player Game is requires important aspects of technology, teamwork and software engineering principles. The whole class was structured in to several teams and students needed to join one or two teams. Each team presented their progress, discussed future milestones and troubleshoots, updated documents for clearer communication and utilized SVN(Subversion) throughout the semester. Unlike usual class setting, all students worked collaboratively together like one company to achieve the goal. In one semester, students started from concept design and completed a working Multiplayer Online Game called "deBugger" (Fall 2009), and "World of Balance" (Fall 2011), while learning game design, 3D graphics, Game Engine, Server-client architecture, Game Protocol, network programming, database, Software Engineering principles, and large application development as a team project.

  • PDF

Energy-efficient Data Dissemination Protocol for Detouring Routing Holes in Wireless Sensor Networks (무선 센서 네트워크에서 라우팅 홀을 우회하기 위한 에너지 효율적 데이타 전달 프로토콜)

  • Ye, Tian;Yu, Fucai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Jin, Min-Sook;Kim, Sang-Ha
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.321-325
    • /
    • 2008
  • Void areas(holes) as an inevitable phenomenon exist in geographic routing of wireless sensor networks, because the unpredictable and harsh nature application environment or uneven energy consumption. Most of the existing schemes for the issue tend to construct a static detour path to bypass a hole. The static detour path may lead to uneven energy consumption of the nodes on the perimeter of the hole; thus it may enlarge the hole. At the same time, traffic would concentrate on the peripheral node of the hole; thus the nodes on the perimeter of the hole tend to be depleted quietly. In previous work, we have proposed a hole geometric model to reduce the energy consumption and packet collisions of the nodes on the hole boundary. This scheme, however, still has the static detour path problem. Therefore, we extend the previous work by constructing a dynamic detour path hole geometric model for wireless sensor networks in this paper. The location of hole detour anchors is dynamically shifted according to Gaussian function, just generating dynamic hole detour paths.

Saccharification of Brown Macroalgae Using an Arsenal of Recombinant Alginate Lyases: Potential Application in the Biorefinery Process

  • Gimpel, Javier A.;Ravanal, Maria Cristina;Salazar, Oriana;Lienqueo, Maria Elena
    • Journal of Microbiology and Biotechnology
    • /
    • v.28 no.10
    • /
    • pp.1671-1682
    • /
    • 2018
  • Alginate lyases (endo and exo-lyases) are required for the degradation of alginate into its constituting monomers. Efficient bioethanol production and extraction of bioactives from brown algae requires intensive use of these enzymes. Nonetheless, there are few commercial alginate lyase preparations, and their costs make them unsuitable for large scale experiments. A recombinant expression protocol has been developed in this study for producing seven endo-lyases and three exo-lyases as soluble and highly active preparations. Saccharification of alginate using 21 different endo/exo-lyase combinations shows that there is complementary enzymatic activity between some of the endo/exo pairs. This is probably due to favorable matching of their substrate biases for the different glycosidic bonds in the alginate molecule. Therefore, selection of enzymes for the best saccharification results for a given biomass should be based on screens comprising both types of lyases. Additionally, different incubation temperatures, enzyme load ratios, and enzyme loading strategies were assessed using the best four enzyme combinations for treating Macrocystis pyrifera biomass. It was shown that $30^{\circ}C$ with a 1:3 endo/exo loading ratio was suitable for all four combinations. Moreover, simultaneous loading of endo-and exo-lyases at the beginning of the reaction allowed maximum alginate saccharification in half the time than when the exo-lyases were added sequentially.

The Study on Ecological Function Assessment at Streams in Rural Area - The Focus of Han-River Basin - (농촌지역 소하천의 생태환경 평가 연구 - 한강유역 지류를 중심으로 -)

  • Kang, Bang-Hun;Kim, Nam-Choon;Son, Jin-Kwan;Kim, Mi-Heui;Cho, Seung-Jin;Rhee, Sang-Young
    • Journal of Korean Society of Rural Planning
    • /
    • v.17 no.2
    • /
    • pp.23-32
    • /
    • 2011
  • The purpose of this study is to produce basic planning criteria required in ecological restoration and improvement works of streams in rural area through the application of stream assessment methods (water quality, soil environment, and ecological function assessment) at 6 study sites of Han River basin. The investigation results were as followings; 1) There were the evaluation items like a manure use, salt degree, river peripheral tree, which did not fitted to apply to domestic streams, in the SVAP (Stream Visual Assessment Protocol) and NRCS Riparian Assessment that were evaluation models developed in USDA. The area inhabitants with a little knowledge and education personally seems to utilize the evaluation methods through improvement partly with an aspect that evaluation is slightly easy. 2) From the stream assessment results, the construction of diverse pools, large woody debris and isolated backwater pool are needed to improve a few of problems observed at the mostly study sites. The result of NRCS Riparian Assessment showed that the improvement of stream bank vegetative communities is needed by planting tree with deep-binding root masses, and managing of noxious weeds and exotic undesirable plants. 3) Summing up, the assessment results showed that the assessment scores were higher at upstream than downstream, the stream with totally maintenance than that with partly maintenance, the stream with slope bank than that with vertical bank, and the stream with a flood plain than that without a flood plain. So, the direction of stream maintenance projects must be set by consideration of those results.

Validation and Application of a Real-time PCR Protocol for the Specific Detection and Quantification of Clavibacter michiganensis subsp. sepedonicus in Potato

  • Cho, Min Seok;Park, Duck Hwan;Namgung, Min;Ahn, Tae-Young;Park, Dong Suk
    • The Plant Pathology Journal
    • /
    • v.31 no.2
    • /
    • pp.123-131
    • /
    • 2015
  • Clavibacter michiganensis subsp. sepedonicus (Cms) multiplies very rapidly, passing through the vascular strands and into the stems and petioles of a diseased potato. Therefore, the rapid and specific detection of this pathogen is highly important for the effective control of the pathogen. Although several PCR assays have been developed for detection, they cannot afford specific detection of Cms. Therefore, in this study, a computational genome analysis was performed to compare the sequenced genomes of the C. michiganensis subspecies and to identify an appropriate gene for the development of a subspecies-specific PCR primer set (Cms89F/R). The specificity of the primer set based on the putative phage-related protein was evaluated using genomic DNA from seven isolates of Cms and 27 other reference strains. The Cms89F/R primer set was more specific and sensitive than the existing assays in detecting Cms in in vitro using Cms cells and its genomic DNA. This assay was also able to detect at least $1.47{\times}10^2copies/{\mu}l$ of cloned-amplified target DNA, 5 fg of DNA using genomic DNA or $10^{-6}$ dilution point of 0.12 at $OD_{600}$ units of cells per reaction using a calibrated cell suspension.

A Study on the Internet GPS Data Processing System (인터넷 GPS 자료처리 시스템에 관한 연구)

  • 윤희천;최병길;이용욱
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.2
    • /
    • pp.145-150
    • /
    • 2004
  • A protocol for the web-based GPS data processing system has been developed. The system is developed following the typical ASP system, in which the GPS data acquired by various users can be uploaded through the web and the data is processed with data processing components selected by the users. After the processing, the results are also transported to the users through the web. The developed system is designed for easy software upgrade and it is an synchronous process mode so that the multiple accesses can be handled with high user flexibility. The database components for the efficient GPS data maintenance are developed so that the data from CORS can be used for the data processing. Currently, the absolute and relative positioning algorithms using code measurements are integrated and much more algorithms such as the data quality control, absolute and relative positioning using phases will be integrated in near future.

A study of Web-Based GPS Data Processing System (웹 기반 GPS 자료처리 시스템 개발에 관한 연구)

  • 최우영;권재현;염재홍;이용욱
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.04a
    • /
    • pp.81-92
    • /
    • 2003
  • A protocol for the web-based GPS data processing system has been developed. The system is developed following the typical ASP system, in which the GPS data acquired by various users can be uploaded through the web and the data is processed with data processing components selected by the users. After the processing, the results are also transported to the users through the web. The developed system is designed for easy software upgrade and it is an asynchronous process mode so that the multiple accesses can be handled with high user flexibility. The database components for the efficient GPS data maintenance are developed so that the data from CORS can be used for the data processing. Currently, the absolute and relative positioning algorithms using code measurements are integrated and much more algorithms such as the data quality control, absolute and relative positioning using phases will be integrated in near future.

  • PDF

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

An Investigation on the Acquisition and Preservation of Online Serials (온라인 연속간행자료수집 및 보존에 관한 연구)

  • Lee, Chi-Ju
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.359-386
    • /
    • 2007
  • This study is to develop the operation models collection and preservation of serials only distributed online. In order to identify all of the requisite items for collection and preservation of the online serials, it conducts Delphi Technique researches with panels of experts from public institutions, organizations, and research institutions. It also deduces the 68 necessary detailed items to develop the operation models for preserving the online serials, and suggests 57 detailed items selected from the compatibility analysis with the investigation and examination of compatibility and urgency. It suggests the automated collection plan of contents with the application of RSS technology of transfer protocol to provide users the updated information from the sites where the contents and data have been constantly and frequently updated. This study strives to design the collection and preservation processes suitable for the online serials.

Ethernet Topology Transformation and Throughput Analysis (이더넷 위상 변환과 성능 분석)

  • 권정국;백의현;이동길;이상호
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.77-85
    • /
    • 2003
  • The conversion into a new Local Area Network (LAN) environment without clear analysis of the problems with the conventional LAN environment nay bring about some improvement of performance, but in general, the result would not be as good as expected. Besides, in case new traffic or application programs are added In the near future, traffic overload similar to the past may incur. Therefore, the conversion into a new LAN environment should not only relieve the problems with the conventional environment but also be able to cope with future expansion of the network flexibly. In the present paper, in view of the above, the problems with protocols and traffic that may occur in the Bus-structured 10/100 Mbps shared Ethernet that has been widely used by many institutions are reviewed, and as a case study whether such conversion into a new LAN environment in order to increase the efficiency in the operation, management, and utilization of the network would be proper for the actual operational environment is implemented, and the results are analyzed.