• Title/Summary/Keyword: IP strategy

Search Result 109, Processing Time 0.028 seconds

Profiling of skeletal muscle tissue for long non-coding RNAs related to muscle metabolism in the QingYu pig at the growth inflection point

  • Luo, Jia;Shen, Linyuan;Gan, Mailin;Jiang, Anan;Chen, Lei;Ma, Jideng;Jin, Long;Liu, Yihui;Tang, Guoqing;Jiang, Yanzhi;Li, Mingzhou;Li, Xuewei;Zhang, Shunhua;Zhu, Li
    • Animal Bioscience
    • /
    • v.34 no.8
    • /
    • pp.1309-1320
    • /
    • 2021
  • Objective: Investigation of muscle growth at different developmental stages is an appropriate strategy for studying the mechanisms underlying muscle development and differences in phenotypes. In particular, the muscle development mechanisms and the difference between the fastest and slowest growth rates. Methods: In this study, we used a growth curve model to fit the growth inflection point (IP) of QingYu pigs and compared differences in the long non-coding RNA (lncRNA) transcriptome of muscle both at the growth IP and plateau phase (PP). Results: The growth curve of the QingYu pig had a good fit (R2 = 0.974) relative to a typical S-curve and reached the IP at day 177.96. At the PP, marbling, intramuscular fat, and monounsaturated fatty acids had increased significantly and the percentage of lean muscle and polyunsaturated fatty acids had decreased. A total of 1,199 mRNAs and 62 lncRNAs were differentially expressed at the IP compared with the PP. Additional to gene ontology and Kyoto encyclopedia of genes and genomes pathway analyses, these differentially expressed protein coding genes were principally related to muscle growth and lipid metabolism. Conclusion: Our results suggest that the identified differentially expressed lncRNAs, could play roles in muscle growth, fat deposition and regulation of fatty acid composition at the IP and PP.

High Performance QoS Traffic Transmission Scheme for Real-Time Multimedia Services in Wireless Networks

  • Kang, Moonsik
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.3
    • /
    • pp.182-191
    • /
    • 2012
  • This paper proposes a high performance QoS (Quality of Service) traffic transmission scheme to provide real-time multimedia services in wireless networks. This scheme is based on both a traffic estimation of the mean rate and a header compression method by dividing this network model into two parts, core RTP/UDP/IP network and wireless access parts, using the IEEE 802.11 WLAN. The improvement achieved by the scheme means that it can be designed to include a means of provisioning the high performance QoS strategy according to the requirements of each particular traffic flow by adapting the header compression for real-time multimedia data. A performance evaluation was carried out to show the effectiveness of the proposed traffic transmission scheme.

  • PDF

All-IP Digital Convergence and Its Effect on the Evolution of the Media Industry (All-IP화 디지털융합 및 미디어산업의 진화 연구)

  • Chung, Suk-Kyun
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.23-38
    • /
    • 2011
  • The advance of All-IP digital convergence is now triggering fundamental changes in the media industry. This article analyzes the evolution of the media industry based on a value chain model, with a special emphasis placed on the impact of digital technology on the structure of media production, distribution, and consumption. As the Internet has evolved into an access channel for all forms of media, the boundaries of the media industry remain unclear and open thus enabling anyone to become a creator of media. Furthermore, the scope of media continues to become more dynamic as competition grows between older and more innovative forms of media. In this light, adapting to innovative technologies and more effectively meeting the needs of customers represent key factors for the continued evolution of the media.

SD Type Class 5 Switch Replacement Strategy For Pre NGN (Pre NGN(Next Generation Network)을 저한 SD교환기의 교체 방안)

  • 한상범;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.406-408
    • /
    • 2002
  • 미래의 통신망 구조인 NGN(Next Generation)으로의 이행을 위하여 현재의 방대한 PSTN(Public Switched Telephone Network) 인프라를 한번에 모두 교체할 수 없으므로 신설되는 VoIP(Voice on IP) 기반의 네트워크와 기존의 PSTN이 상호 연동되는 과도기적 과정으로 Pre NGN이 제안되고 있으나 SS7(Signaling System No 7)을 기반으로 하고 있어 아직도 상당수를 차지하는 SD(Space Division) 교환기의 교체는 불가피한 것으로 보인다. 본 논문에서는 SD 교환기를 TD(Time Division) 교환기로 교체하기보다는 미래의 NGN을 지향하며 소요비용의 절감을 위하여 Soft Switch기능을 보유한 AGW(Access Gate Way)로의 교체를 제안하고 현재의 망에서 필요한 기능 및 조건을 제시 하였다.

  • PDF

Evolution Strategy for Next Generation Networks with using Traditional PSTN (기존 교환망을 활용한 차세대 통신망 진화 전략)

  • Kim, Jeong-Yoon;Park, Young-Sik;Lee, Kyu-Ouk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.623-626
    • /
    • 2001
  • 본 논문에서는 별도 장비에 의하여 음성 서비스와 ADSL 인터넷 접속 서비스를 각각 제공하는 현재의 통신망 환경에서 음성 서비스와 ADSL 서비스를 한 시스템에서 모두 제공하는 통합 액세스 장비를 이용한 액세스 망의 패킷화 방법과, VoATM/IP 게이트웨이를 이용한 중계망을 패킷화 방법, 그리고 통합 액세스 장비, VoATM/IP Gateway 그리고 SoftSwitch를 결합하여 통신망 전체를 패킷화 하는 차세대 통신망 진화 전략을 비교한다. 또한 경제성을 최대로 활용한 통신망 진화 전략과 패킷화 도입에 따른 고려사항을 방법을 도출하고자 한다.

  • PDF

A Strategy for Robot Tele-operating Communication (로봇 원격제어 통신 방안)

  • Choi, You-Rak;Lee, Jae-Cheol;Kim, Jae-Hee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.204-206
    • /
    • 2015
  • 본 논문에서는 원자력발전소와 같은 극한환경에서 사용할 수 있는 로봇 원격제어를 위한 데이터 송수신용 통신 모듈 구현의 제약 조건을 기술하고 이를 해결할 수 있는 방안을 제시한다. 원격제어는 오퍼레이터가 원격지 로봇의 다양한 환경 정보를 인식하면서 로봇 제어 명령을 전송하는 특성을 갖는다. 오퍼레이터와 원격지 로봇 사이에 지속적인 데이터 통신에 의해 제어를 수행하므로, 통신 속도와 통신 프로토콜에 따른 현재의 통신 상태 보장 방안도 필요하다. 네트워크 기반 통신에서는 물리적 환경에 의한 영향을 포함하여 TCP/IP 프로토콜의 경우 핸드쉐이크와 혼잡회피 알고리즘 등에 의한 논리적 통신 속도의 지터가 발생하므로, 로봇 원격제어 시 이 문제를 충분히 검토해야한다. 로봇 원격제어를 위해서는 TCP/IP는 물론 UDP와 같은 통신 프로토콜과 시리얼 통신 기반의 다양한 프로토콜을 적용할 수 있는데, 송수신 데이터의 종류에 따라 적절한 프로토콜을 적용해야하며 통신 라인의 연결 상태도 확인할 수 있어야 한다.

  • PDF

New Approach to Verification in Security Protocol by using Fuzzy Algorithm (퍼지 알고리즘을 이용한 보안 프로토콜 검증)

  • 신승중;박인규
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.343-349
    • /
    • 2000
  • The objective of this paper was to cope with the verification of the message transfer protocol that integrates the electronic signature and the distribution and authentication of public key in TCP/IP using Choquet fuzzy integral compapred with fuzzy integral. They were classified into the security technology, the security policy, the electronic document processing, the electronic document transportation and the encryption and decryption keys in its function. The measures of items of the message security protocol were produced for the verification of the implemented document in every function.

  • PDF

A Data-Mining Model to Support new Customer Acquisition for Internet Telephony(VoIP) (인터넷전화(VoIP)의 신규고객 유치를 지원하는 데이터마이닝 모델)

  • Ha, Sung-Ho;Yang, Jeong-Won;Song, Young-Mi
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.2
    • /
    • pp.133-154
    • /
    • 2010
  • Recently, Internet Telephony has become increasingly popular in telecommunication industry. However, previous research on Internet Telephony has focused on analyzing specific Internet Telephonysolutions, identifyingthe Internet Telephony movement itself. The research on prediction models about Internet Telephony adoption has been minimal. The main propose of this study is to develop models for predicting transition intention from using traditional telephones to using Internet Telephony. To do so, this study uses data mining methods to analyze demands in the IT communications market and to provide management strategies for Internet telephony providers. Especially this study uses discriminant analysis, logistic regression, classification tree, and neural nets to develop those prediction models toward Internet Telephony adoption. The models are compared with each other and a superior model is chosen.

  • PDF

Reducing False Alarm and Shortening Worm Detection Time in Virus Throttling (Virus Throttling의 웜 탐지오판 감소 및 탐지시간 단축)

  • Shim Jae-Hong;Kim Jang-bok;Choi Hyung-Hee;Jung Gi-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.847-854
    • /
    • 2005
  • Since the propagation speed of the Internet worms is quite fast, worm detection in early propagation stage is very important for reducing the damage. Virus throttling technique, one of many early worm detection techniques, detects the Internet worm propagation by limiting the connection requests within a certain ratio.[6, 7] The typical throttling technique increases the possibility of false detection by treating destination IP addresses independently in their delay queue managements. In addition, it uses a simple decision strategy that determines a worn intrusion if the delay queue is overflown. This paper proposes a two dimensional delay queue management technique in which the sessions with the same destination IP are linked and thus a IP is not stored more than once. The virus throttling technique with the proposed delay queue management can reduce the possibility of false worm detection, compared with the typical throttling since the proposed technique never counts the number of a IP more than once when it chicks the length of delay queue. Moreover, this paper proposes a worm detection algorithm based on weighted average queue length for reducing worm detection time and the number of worm packets, without increasing the length of delay queue. Through deep experiments, it is verified that the proposed technique taking account of the length of past delay queue as well as current delay queue forecasts the worn propagation earlier than the typical iuぉ throttling techniques do.

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.