• Title/Summary/Keyword: Host system model

Search Result 204, Processing Time 0.026 seconds

Next-Generation File Transfer Protocol Which support concurrent file transmissions effectively in Internet (인터넷에서 동시 파일 전송을 효과적으로 지원하는 NFTP의 설계 및 구현)

  • Choi, Jae-Nam
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.90-95
    • /
    • 2002
  • Though the FTP(File Transfer Protocol) has been used widely and stable, It has the structural weakness that can't support current file transmissions so that we have to wait the completion of previous file transmission when try to transmit another file. If try to transmit multiple files concurrently using this FTP, It has to forking multiple FTP servers and clients in each user's PC and ISP's host machine it would result in the waist of memory, resource of network and the high workload of system. In order to solving previous problem, in this paper I have designed the new model of FTP which based on multi-thread and created NFTP(Next-Generation FTP)protocol so that may reduce the workload of system and support current file transmission effectively. I have implemented NFTP and also applied to real service, as a result It have provided reliable service by reducing the workload of system and saved the waiting time which would happened.

Design of T-N2SCD Detection Model based on Time Window (타임 윈도우 기반의 T-N2SCD 탐지 모델 구현)

  • Shin, Mi-Yea;Won, Il-Young;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2341-2348
    • /
    • 2009
  • An intrusion detection technique based on host consider system call sequence or system call arguments. These two ways are suitable when system call sequence or order and length of system call arguments are out of order. However, there are two disadvantages which a false positive rate and a false negative rate are high. In this paper we propose the T-N2SCD detection model based on Time Window in order to reduce false positive rate and false negative rate. Data for using this experiment is provided from DARPA. As experimental results, the proposed model showed that the false positive rate and the false negative rate are lowest at an interval of 1000ms than at different intervals.

Innate Immune Response of NNV Infection in Fish and Its Disease Prevention

  • Lu, Ming-Wei;Wu, Jen-Leih
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.2 no.3
    • /
    • pp.127-132
    • /
    • 2007
  • The innate immune response which is seen as the initial defense mechanism induced upon foreign invasion has been well documented in higher vertebrates. This has also been observed in fish infected with NNV. However, the fish immune system based on fully established genome project has not been fully elucidated. Therefore, in this review, we hope to correlate NNV infection in fish that has devastated the aquaculture industry, to its host immune system. Further, we discuss the potential preventive measures in overcoming the widespread of this neurodisease.

  • PDF

Mass inflow history of satellite systems around a dwarf galaxy

  • Chun, Kyungwon;Shin, Jihye;Kim, Sungsoo S.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.63.4-64
    • /
    • 2016
  • We aim to investigate inflow history of matters that fall into the satellite systems around a dwarf galaxy in Lambda-Cold Dark Matter model. Each satellite system has unique properties because all satellite systems have different mass inflow history by environments and/or the events such as cosmic reionization and merging with other halos. To trace mass inflow history of the satellite systems, we perform three different cosmological zoom simulations whose galaxy mass is ${\sim}10^{10}M_{sun}$. Each initial zoom simulation covers a cubic box of $1Mpc/h^3$ with 17 million particles. Particle mass for dark matter (DM) and gas components is $M_{DM}=4.1{\times}10^3M_{sun}$ and $M_{gas}=7.9{\times}10^2M_{sun}$, respectively. Thus, each satellite system is resolved with more than hundreds - thousands of particles. We analyze the influence of the gravitational interaction with host galaxy, baryonic matter inflow by various cooling mechanisms, and merging events with other halos on the mass inflow history of satellite systems.

  • PDF

Analytical Coexistence Benchmark for Assessing the Utmost Interference Tolerated by IEEE 802.20

  • Abdulla, Mouhamed;Shayan, Yousef R.
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.43-52
    • /
    • 2011
  • Whether it is crosstalk, harmonics, or in-band operation of wireless technologies, interference between a reference system and a host of offenders is virtually unavoidable. In past contributions, a benchmark has been established and considered for coexistence analysis with a number of technologies including FWA, UMTS, and WiMAX. However, the previously presented model does not take into account the mobility factor of the reference node in addition to a number of interdependent requirements regarding the link direction, channel state, data rate and system factors; hence limiting its applicability for the MBWA (IEEE 802.20) standard. Thus, over diverse modes, in this correspondence we analytically derived the greatest aggregate interference level tolerated for high-fidelity transmission tailored specifically for the MBWA standard. Our results, in the form of benchmark indicators, should be of particular interest to peers analyzing and researching RF coexistence scenarios with this new protocol.

A Fuzzy Continuous Petri Net Model for Helper T cell Differentiation

  • Park, In-Ho;Na, Do-Kyun;Lee, Kwang-H.;Lee, Do-Heon
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.344-347
    • /
    • 2005
  • Helper T(Th) cells regulate immune response by producing various kinds of cytokines in response to antigen stimulation. The regulatory functions of Th cells are promoted by their differentiation into two distinct subsets, Th1 and Th2 cells. Th1 cells are involved in inducing cellular immune response by activating cytotoxic T cells. Th2 cells trigger B cells to produce antibodies, protective proteins used by the immune system to identify and neutralize foreign substances. Because cellular and humoral immune responses have quite different roles in protecting the host from foreign substances, Th cell differentiation is a crucial event in the immune response. The destiny of a naive Th cell is mainly controlled by cytokines such as IL-4, IL-12, and IFN-${\gamma}$. To understand the mechanism of Th cell differentiation, many mathematical models have been proposed. One of the most difficult problems in mathematical modeling is to find appropriate kinetic parameters needed to complete a model. However, it is relatively easy to get qualitative or linguistic knowledge of a model dynamics. To incorporate such knowledge into a model, we propose a novel approach, fuzzy continuous Petri nets extending traditional continuous Petri net by adding new types of places and transitions called fuzzy places and fuzzy transitions. This extension makes it possible to perform fuzzy inference with fuzzy places and fuzzy transitions acting as kinetic parameters and fuzzy inference systems between input and output places, respectively.

  • PDF

Wireless Speech Recognition System using Psychoacoustic Model (심리음향 모델을 이용한 무선 음성인식 시스템)

  • Noh, Jin-Soo;Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.110-116
    • /
    • 2006
  • In this paper, we implement a speech recognition system to support ubiquitous sensor network application services such as switch control, authentication, etc. using wireless audio sensors. The proposed system is consist of the wireless audio sensor, the speech recognition algorithm using psychoacoustic model and LDPC(low density parity check) for correcting errors. The proposed speech recognition system is inserted in a HOST PC to use the sensor energy effectively mil to improve the accuracy of speech recognition, a FEC(Forward Error Correction) system is used. Also, we optimized the simulation coefficient and test environment to effectively remove the wireless channel noises and correcting wireless channel errors. As a result, when the distance between sensor and the source of voice is less then 1.0m FAR and FRR are 0.126% and 7.5% respectively.

Optimization of Switching Time from Growth to Product Formation for Maximum Productivity of Recombinant Escherichia coli Fermentation (유전자 재조합 대장균 발효의 최대 생산성을 위한 생육에서 제품 생성으로 전환시기의 최적화)

  • Anant Y. Patkar
    • Microbiology and Biotechnology Letters
    • /
    • v.18 no.4
    • /
    • pp.394-400
    • /
    • 1990
  • Maximization of productivity of recombinant cell fermentations requires consideration of the inverse relationship between the host cell growth rate and product formation rate. The problem of maximizing a weighted performance index was solved by using optimal control theory for recombinant E. coli fermentation. Concentration of a growth inhibitor was used as a control variable to manipulate the specific growth rate, and consequently the cloned-gene expression rate. Using a simple unstructured model to describe the main characteristics of this system, theoretical analysis showed that the optimal control profile results in an initial high growth rate phase followed by a low growth rate and high product formation rate phase. Numerical calculations were done to determine optimal switching times from the growth to the production stage for two representative cases corresponding to different dependency of the product formation rate on the growth rate. For the case when product formation rate is sensitive to the specific growth rate, the optimized operation yields about 60% increase in the final product concentration compared with a simple batch fermentation.

  • PDF

Energy and Service Level Agreement Aware Resource Allocation Heuristics for Cloud Data Centers

  • Sutha, K.;Nawaz, G.M.Kadhar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5357-5381
    • /
    • 2018
  • Cloud computing offers a wide range of on-demand resources over the internet. Utility-based resource allocation in cloud data centers significantly increases the number of cloud users. Heavy usage of cloud data center encounters many problems such as sacrificing system performance, increasing operational cost and high-energy consumption. Therefore, the result of the system damages the environment extremely due to heavy carbon (CO2) emission. However, dynamic allocation of energy-efficient resources in cloud data centers overcomes these problems. In this paper, we have proposed Energy and Service Level Agreement (SLA) Aware Resource Allocation Heuristic Algorithms. These algorithms are essential for reducing power consumption and SLA violation without diminishing the performance and Quality-of-Service (QoS) in cloud data centers. Our proposed model is organized as follows: a) SLA violation detection model is used to prevent Virtual Machines (VMs) from overloaded and underloaded host usage; b) for reducing power consumption of VMs, we have introduced Enhanced minPower and maxUtilization (EMPMU) VM migration policy; and c) efficient utilization of cloud resources and VM placement are achieved using SLA-aware Modified Best Fit Decreasing (MBFD) algorithm. We have validated our test results using CloudSim toolkit 3.0.3. Finally, experimental results have shown better resource utilization, reduced energy consumption and SLA violation in heterogeneous dynamic cloud environment.

Design and Analysis of Real-time Intrusion Detection Model for Distributed Environment (분산환경을 위한 실시간 침입 탐지 모델의 설계)

  • 이문구;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.71-84
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion when it happens. To solve the problem, we are studying a real-time intrusion detection. Because a previous intrusion detection system(IDS) is running on the host level, it difficult to port and to extend to other system on the network level that distributed environment. Also IDS provides the confidentiality of messages when it sends each other. This paper proposes a model of real-time intrusion detection using agents. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.