• 제목/요약/키워드: Checkpoints

검색결과 106건 처리시간 0.031초

HORB에 기반한 신뢰성 있는 분산 프로그래밍 환경의 설계 및 구현 (Design and Implementation of Reliable Distributed Programming Environment based on HORB)

  • 현무용;김식;김명준
    • 전자공학회논문지CI
    • /
    • 제39권2호
    • /
    • pp.1-9
    • /
    • 2002
  • DSOM, DCOM, CORBA, Java RMI 같은 객체 지향 분산 프로그래밍 환경을 이용한 분산 응용 프로그램 개발이 일반화되고 있다. 그러나, 이러한 분산 미들웨어들은 응용프로그램의 품질과 재사용성을 향상시켜 주지만, 결함 허용 기능을 지원하지 않음으로서 신뢰성이 보장된 객체 기반 분산 응용프로그램의 설계 및 구현을 복잡하게 한다. 본 논문에서는 RMI 메커니즘을 기반으로 한 결함 허용 분산 시스템 개발 환경인 에버그린(Evergreen)을 제안하고자 한다. 에버그린은 신뢰성 있는 분산 컴퓨팅을 지원하기 위해서 체크포인트와 롤백 복구(rollback recovery) 메커니즘을 이용하여 설계되었다 일련의 실험을 통해 에버그린의 성능을 평가하였고 최적의 디자인 목표를 지원하기 위한 확장 가능성을 확인하였다.

Convergence of Cancer Metabolism and Immunity: an Overview

  • Van Dang, Chi;Kim, Jung-whan
    • Biomolecules & Therapeutics
    • /
    • 제26권1호
    • /
    • pp.4-9
    • /
    • 2018
  • Cancer metabolism as a field of research was founded almost 100 years ago by Otto Warburg, who described the propensity for cancers to convert glucose to lactate despite the presence of oxygen, which in yeast diminishes glycolytic metabolism known as the Pasteur effect. In the past 20 years, the resurgence of interest in cancer metabolism provided significant insights into processes involved in maintenance metabolism of non-proliferating cells and proliferative metabolism, which is regulated by proto-oncogenes and tumor suppressors in normal proliferating cells. In cancer cells, depending on the driving oncogenic event, metabolism is re-wired for nutrient import, redox homeostasis, protein quality control, and biosynthesis to support cell growth and division. In general, resting cells rely on oxidative metabolism, while proliferating cells rewire metabolism toward glycolysis, which favors many biosynthetic pathways for proliferation. Oncogenes such as MYC, BRAF, KRAS, and PI3K have been documented to rewire metabolism in favor of proliferation. These cell intrinsic mechanisms, however, are insufficient to drive tumorigenesis because immune surveillance continuously seeks to destroy neo-antigenic tumor cells. In this regard, evasion of cancer cells from immunity involves checkpoints that blunt cytotoxic T cells, which are also attenuated by the metabolic tumor microenvironment, which is rich in immuno-modulating metabolites such as lactate, 2-hydroxyglutarate, kynurenine, and the proton (low pH). As such, a full understanding of tumor metabolism requires an appreciation of the convergence of cancer cell intrinsic metabolism and that of the tumor microenvironment including stromal and immune cells.

Radiation Detection System for Prevention of Illicit Trafficking of Nuclear and Radioactive Materials

  • Kwak, Sung-Woo;Chang, Sung-Soon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • 제35권4호
    • /
    • pp.167-171
    • /
    • 2010
  • Fixed radiation portal monitors (RPMs) deployed at border, seaport, airport and key traffic checkpoints have played an important role in preventing the illicit trafficking and transport of nuclear and radioactive materials. However, the RPM is usually large and heavy and can't easily be moved to different locations. These reasons motivate us to develop a mobile radiation detection system. The objective of this paper is to report our experience on developing the mobile radiation detection system for search and detection of nuclear and radioactive materials during road transport. Field tests to characterize the developed detection system were performed at various speeds and distances between the radioactive isotope (RI) transporting car and the measurement car. Results of measurements and detection limits of our system are described in this paper. The mobile radiation detection system developed should contribute to defending public's health and safety and the environment against nuclear and radiological terrorism by detecting nuclear or radioactive material hidden illegally in a vehicle.

DNA damage to human genetic disorders with neurodevelopmental defects

  • Lee, Youngsoo;Choi, Inseo;Kim, Jusik;Kim, Keeeun
    • Journal of Genetic Medicine
    • /
    • 제13권1호
    • /
    • pp.1-13
    • /
    • 2016
  • Although some mutations are beneficial and are the driving force behind evolution, it is important to maintain DNA integrity and stability because it contains genetic information. However, in the oxygen-rich environment we live in, the DNA molecule is under constant threat from endogenous or exogenous insults. DNA damage could trigger the DNA damage response (DDR), which involves DNA repair, the regulation of cell cycle checkpoints, and the induction of programmed cell death or senescence. Dysregulation of these physiological responses to DNA damage causes developmental defects, neurological defects, premature aging, infertility, immune system defects, and tumors in humans. Some human syndromes are characterized by unique neurological phenotypes including microcephaly, mental retardation, ataxia, neurodegeneration, and neuropathy, suggesting a direct link between genomic instability resulting from defective DDR and neuropathology. In this review, rare human genetic disorders related to abnormal DDR and damage repair with neural defects will be discussed.

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

Tumor Immunology and Immune Checkpoint Inhibitors in Non-Small Cell Lung Cancer

  • Jung, Chi Young;Antonia, Scott J.
    • Tuberculosis and Respiratory Diseases
    • /
    • 제81권1호
    • /
    • pp.29-41
    • /
    • 2018
  • Lung cancer is one of the most commonly diagnosed cancers and the leading cause of cancer-related deaths worldwide. Although progress in the treatment of advanced non-small cell lung cancer (NSCLC) has been made over the past decade, the 5-year survival rate in patients with lung cancer remains only 10%-20%. Obviously, new therapeutic options are required for patients with advanced NSCLC and unmet medical needs. Cancer immunotherapy is an evolving treatment modality that uses a patient's own immune systems to fight cancer. Theoretically, cancer immunotherapy can result in long-term cancer remission and may not cause the same side effects as chemotherapy and radiation. Immunooncology has become an important focus of basic research as well as clinical trials for the treatment of NSCLC. Immune checkpoint inhibitors are the most promising approach for cancer immunotherapy and they have become the standard of care for patients with advanced NSCLC. This review summarizes basic tumor immunology and the relevant clinical data on immunotherapeutic approaches, especially immune checkpoint inhibitors in NSCLC.

초등학교의 학교보건정책 지침개발 및 수행정도 분석 - WHO의 건강증진학교 지침을 중심으로 - (Development and Performance Analysis of Elementary School Health Promotion Policy Guideline)

  • 정영숙;한주희;이춘옥;권인숙;이정렬
    • 지역사회간호학회지
    • /
    • 제14권3호
    • /
    • pp.457-467
    • /
    • 2003
  • Purpose: This study examined the development and performance of the school health promotion policy guideline that is applicable to Korean school health. Methods: 1. The WHO's guideline was translated into Korean and modified by school health experts 2. A questionnaire was conducted to assess the performance of school health policy on 207 nurses in elementary schools in Seoul and Cheonbuk. Result: The Korean version of the school health promotion policy guidelines were developed including 9 components and 36 checkpoints. Compared to that of WHO, the component 'school nursing teacher' was added and three components were eliminated: 'equitable access to school resources', 'control of helminth', and 'sun protection policy'. The performance degree of first-aid, closure of school in a calamity, and control of HIV/AIDS was very low. The performance degree of a healthy diet, and regular physical examination was quite high. This study was the first that developed the school health promotion policy guideline and examined the performance. Further research is needed to validate the guidelines developed by this study.

  • PDF

안드로이드 뱅킹 어플리케이션 내 중간언어 분석을 통한 보안 검사 지점 우회 취약점 연구 (A Study on the Vulnerability of Using Intermediate Language in Android: Bypassing Security Check Point in Android-Based Banking Applications)

  • 이우진;이경호
    • 정보보호학회논문지
    • /
    • 제27권3호
    • /
    • pp.549-562
    • /
    • 2017
  • 최근 모바일뱅킹 사용의 일상화와 더불어 은행권에서 모바일뱅킹의 사용 비중이 더욱 커져감에 따라 보안 위협도 증가하고 있다. 이에 국내 금융권에서는 뱅킹 어플리케이션 내에 보안 솔루션들을 도입하고, 상시 실행되는지 여부를 확인하기 위하여 보안 검사 지점들을 설정하여 어플리케이션의 안정성을 보장하고 있다. 본 논문에서는 국내 주요 은행들의 안드로이드 뱅킹 어플리케이션 디컴파일(decompile)시 추출되는 중간언어를 정적 및 동적 분석하여 보안 검사 지점들을 우회하는 모바일 백신 프로그램 미작동의 취약점을 보인다. 또한, 결과를 통해 이를 악용할 수 있는 공격을 알아보고 대응 방안을 제시한다.

Monitoring of Graveyards in Mountainous Areas with Simulated KOMPSAT-2 imagery

  • Chang, Eun-Mi;Kim, Min-Ho;Lee, Byung-Whan;Heo, Min
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2003년도 Proceedings of ACRS 2003 ISRS
    • /
    • pp.1409-1411
    • /
    • 2003
  • The application of simulated KOMPSAT-2 imagery to monitor graveyards is to be developed. Positions calculated from image were compared with those obtained from Geographic Positioning System. With 24 checkpoints, the position of graveyards showed within 5-meter range. Unsupervised classification, supervised classification, and objected-orientation classification algorithms were used to extract the graveyard. Unsupervised classification with masking processes based on National topographic data gives the best result. The graveyards were categorized with four types in field studies while the two types of graveyards were shown in descriptive statistics. Cluster Analysis and discriminant analysis showed the consistency with two types of tombs. It was hard to get a specific spectral signature of graveyards, as they are covered with grasses at different levels and shaded from the surrounding trees. The slopes and aspects of location of graveyards did not make any difference in the spectral signatures. This study gives the basic spectral characteristics for further development of objected-oriented classification algorithms and plausibility of KOMPSAT-2 images for management of mountainous areas in the aspect of position accuracy and classification accuracy.

  • PDF

Immune checkpoint inhibitors: recent progress and potential biomarkers

  • Darvin, Pramod;Toor, Salman M.;Nair, Varun Sasidharan;Elkord, Eyad
    • Experimental and Molecular Medicine
    • /
    • 제50권12호
    • /
    • pp.10.1-10.11
    • /
    • 2018
  • Cancer growth and progression are associated with immune suppression. Cancer cells have the ability to activate different immune checkpoint pathways that harbor immunosuppressive functions. Monoclonal antibodies that target immune checkpoints provided an immense breakthrough in cancer therapeutics. Among the immune checkpoint inhibitors, PD-1/PD-L1 and CTLA-4 inhibitors showed promising therapeutic outcomes, and some have been approved for certain cancer treatments, while others are under clinical trials. Recent reports have shown that patients with various malignancies benefit from immune checkpoint inhibitor treatment. However, mainstream initiation of immune checkpoint therapy to treat cancers is obstructed by the low response rate and immune-related adverse events in some cancer patients. This has given rise to the need for developing sets of biomarkers that predict the response to immune checkpoint blockade and immune-related adverse events. In this review, we discuss different predictive biomarkers for anti-PD-1/PD-L1 and anti-CTLA-4 inhibitors, including immune cells, PD-L1 overexpression, neoantigens, and genetic and epigenetic signatures. Potential approaches for further developing highly reliable predictive biomarkers should facilitate patient selection for and decision-making related to immune checkpoint inhibitor-based therapies.