• Title/Summary/Keyword: MACS

Search Result 82, Processing Time 0.027 seconds

An Approach of False Data Identification Protocol for Minimum Communication Cost in Wireless Sensor Network (무선 센서 네트워크에서 최소 통신비용 수행을 위한 허위 데이터 식별 프로토콜)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.121-129
    • /
    • 2011
  • In wireless sensor networks, a compromised sensor node can inject false data during data aggregation. Existing solutions of securing data aggregation require high communication cost in securing data aggregation. In this paper, we propose a monitoring-based secure data aggregation protocol that minimizes communication cost of identifying the location of false data injection attacks. The main idea is that when monitoring nodes find an injected false data, their reporting messages along with Message Authentication Codes (MACs) are summarized in a single message before sending it to the Base Station (BS). Then the BS identifies the attacking node. The simulation shows that energy consumption of the proposed protocol with short and normal concatenations of MACs are 45% and 36% lower than that of an existing protocol, respectively.

Comparative analysis of commonly used peak calling programs for ChIP-Seq analysis

  • Jeon, Hyeongrin;Lee, Hyunji;Kang, Byunghee;Jang, Insoon;Roh, Tae-Young
    • Genomics & Informatics
    • /
    • v.18 no.4
    • /
    • pp.42.1-42.9
    • /
    • 2020
  • Chromatin immunoprecipitation coupled with high-throughput DNA sequencing (ChIP-Seq) is a powerful technology to profile the location of proteins of interest on a whole-genome scale. To identify the enrichment location of proteins, many programs and algorithms have been proposed. However, none of the commonly used peak calling programs could accurately explain the binding features of target proteins detected by ChIP-Seq. Here, publicly available data on 12 histone modifications, including H3K4ac/me1/me2/me3, H3K9ac/me3, H3K27ac/me3, H3K36me3, H3K56ac, and H3K79me1/me2, generated from a human embryonic stem cell line (H1), were profiled with five peak callers (CisGenome, MACS1, MACS2, PeakSeq, and SISSRs). The performance of the peak calling programs was compared in terms of reproducibility between replicates, examination of enriched regions to variable sequencing depths, the specificity-to-noise signal, and sensitivity of peak prediction. There were no major differences among peak callers when analyzing point source histone modifications. The peak calling results from histone modifications with low fidelity, such as H3K4ac, H3K56ac, and H3K79me1/me2, showed low performance in all parameters, which indicates that their peak positions might not be located accurately. Our comparative results could provide a helpful guide to choose a suitable peak calling program for specific histone modifications.

A Rare Stinkhorn Fungus Itajahya rosea Attract Drosophila by Producing Chemical Attractants

  • Borde, Mahesh;Kshirsagar, Yogesh;Jadhav, Reshma;Baghela, Abhishek
    • Mycobiology
    • /
    • v.49 no.3
    • /
    • pp.223-234
    • /
    • 2021
  • Itajahya rosea was found growing in association with Leucaena leucocephala plants at Savitribai Phule Pune University campus in India. The species identity was confirmed by phylogenetic analysis based on ITS and LSU regions of rDNA, wherein, our fugus was placed along with I. rosea in phylogenetic tree. It represents first record of I. rosea from India. Frequent visitation by Drosophila species on I. rosea fruiting body particularly on gleba was observed. The Drosophila got attracted to the detached gleba under the laboratory conditions and even sometimes, they prefer to sit over the gleba as compare to their food banana. It suggested that I. rosea gleba or pseudostipe produces some compounds for attraction and feeding behavior of Drosophila species. Therefore, we characterized the volatile attractants produced by gleba and pseudostipe of I. rosea by GC-MS analysis. Nineteen compounds were identified from gleba while nine compounds were recovered from the pseudostipe. Out of them, blends of three abundant odor producing volatile compounds were reported namely, Hexadecane, Pentadecane and Nonadecane, which are responsible for attraction of Drosophila toward the gleba. Three fatty acids namely 9,12-octadecadienoic acid (Z,Z), hexadecanoic acid and benzoic acid ethyl ester produced are served as an appetitive signal through olfactory response of Drosophila, so the flies were feed on the gleba. Two pheromones' compounds, heneicosane and (+)-(5S,9S)-5,9-dimethylpentadecane, were also reported in pseudostipe and gleba, respectively, which play a role in Drosophila for breeding. Our study highlights an intriguing chemical ecology of fungus-Drosophila interaction.

Yeast two-hybrid assay with fluorescence reporter (형광 리포터를 활용한 효모 단백질 잡종 기법 개발)

  • Park, Seong Kyun;Seo, Su Ryeon;Hwang, Byung Joon
    • Korean Journal of Microbiology
    • /
    • v.55 no.3
    • /
    • pp.199-205
    • /
    • 2019
  • Yeast two-hybrid (Y2H) technique has been used to study protein-protein interactions, but its application particularly to a large-scale analysis of protein interaction networks, is limited by the fact that the technique is labor-intensive, based on scoring colonies on plate. Here, we develop a new reporter for the measurement of the protein-protein interactions by flow cytometry. The yeast harboring interacting proteins can also be enriched by fluorescence-activated cell sorting (FACS) or magnetic-activated cell sorting (MACS). When two interacting proteins are present in the same yeast cell, a reporter protein containing 10 tandem repeats of c-myc epitope becomes localized on the surface of the cell wall, without affecting cell growth. We successful measured the surface display of c-myc epitope upon interacting p53 with SV40 T antigen by flow cytometry. Thus, the newly developed Y2H assay based on the display of c-myc repeat on yeast cell wall could be used to the simultaneous analysis of multiple protein-protein interactions without laborious counting colonies on plate.

A Biological Signal Analysis Workstation for SiMACS (SiMACS에서의 생체신호해석을 위한 Workstation)

  • Kim, Hyung-Jin;Park, Seung-Hun;Woo, Eung-Je
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1994 no.05
    • /
    • pp.60-62
    • /
    • 1994
  • In this paper, we present a signal analysis workstation in which the user can scrutinize and quantify biological signals, observe the effects of various signal processing algorithms on them, and eventually get some interpretation of clinical use. Within the system, the user can also access all the information in the central data base, such as patient personal information, biological signal information, and insert his interpretation results obtained into the data base after his careful observation. The software system is designed in an object-oriented paradigm, and written in C++ as a window-based application program.

  • PDF

A Hierarchical MAC Protocol for QoS Support in Wireless Wearable Computer Systems

  • Hur, Kyeong
    • Journal of information and communication convergence engineering
    • /
    • v.12 no.1
    • /
    • pp.14-18
    • /
    • 2014
  • A recent major development in computer technology is the advent of wearable computer systems. Wearable computer systems employ a wireless universal serial bus (WUSB), which refers to a combination of USB with the WiMedia wireless technical specifications. In this study, we focus on an integrated system of WUSB over wireless body area networks (WBANs) for wireless wearable computer systems. However, current WBAN MACs do not have well-defined quality of service (QoS) mapping and resource allocation mechanisms to support multimedia streams with the requested QoS parameters. To solve this problem, we propose a novel QoS-aware time slot allocation method. The proposed method provides fair and adaptive QoS provisioning to isochronous streams according to current traffic loads and their requested QoS parameters by executing a QoS satisfaction algorithm at the WUSB/WBAN host. The simulation results show that the proposed method improves the efficiency of time slot utilization while maximizing QoS provisioning.

Adaptive Medium Access Control protocol for low-power wireless sensor network (저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜)

  • Kang, Jeong-Hoon;Lee, Min-Goo;Yoon, Myung-Hyun;Yoo, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF

Energy efficient Medium Access Control for multi-hop sensor network (멀티-홉 센서 네트워크 저전력 MAC 설계)

  • Gang, Jeong-Hun;Lee, Min-Gu;Park, Byeong-Ha;Yu, Jun-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2003.11b
    • /
    • pp.279-282
    • /
    • 2003
  • This paper proposes a medium-access control(MAC) protocol designed for wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy sayings.

  • PDF

A Survey on IEEE 802.11 MAC Analytical Modeling for MAC Performance Evaluation

  • Heo, Ung;Yu, Changfang;You, Kang-Soo;Choi, Jae-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.2
    • /
    • pp.119-127
    • /
    • 2011
  • The paper surveys various analytical models for IEEE 802.11 medium access control protocols and critically discusses recent issues developing in wireless mobile ad hoc networks and their MACs. The surveyed MAC protocols include the standard IEEE 802.11 MAC suites such as IEEE 802.11 DCF, IEEE 802.11 PCF, IEEE 802.11e EDCA, and IEEE 802.11 ad hoc mode; and also the newer, de facto MAC protocols. We study the analytic models of the standard MAC suites followed by the newer analytic models that have been published in recent years. Also, the paper tries to include most of current literatures discussing analytic modeling of MAC in conjunction to some critical issues such as contention among ad hoc nodes, hidden terminal problems, and real-time service support.

A Study on the Contents Security Management Model for Multi-platform Users

  • Joo, Hansol;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.10-14
    • /
    • 2021
  • Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.