• Title/Summary/Keyword: Network Scanning

Search Result 288, Processing Time 0.029 seconds

Analysis and 3D Reconstruction of a Cerebral Vascular Network Using Image Threshold Techniques in High-resolution Images of the Mouse Brain (쥐 뇌의 고해상도 이미지에서 임계화 기법을 활용한 뇌혈관 네트워크 분석 및 3D 재현)

  • Lee, Junseok
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.9
    • /
    • pp.992-999
    • /
    • 2019
  • In this paper, I lay the foundation for creating a multiscale atlas that characterizes cerebrovasculature structural changes across the entire brain of a mouse in the Knife-Edge Scanning Microscopy dataset. The geometric reconstruction of the vascular filaments embedded in the volume imaging dataset provides the ability to distinguish cerebral vessels by diameter and other morphological properties across the whole mouse brain. This paper presents a means for studying local variations in the small vascular morphology that have a significant impact on the peripheral nervous system in other cerebral areas, as well as the robust and vulnerable side of the cerebrovasculature system across the large blood vessels. I expect that this foundation will prove invaluable towards data-driven, quantitative investigations into the system-level architectural layout of the cerebrovasculature and surrounding cerebral microstructures.

Network Structure and Dextran Formation of Jeungpyeon Made with Yeast Starter

  • Hahn, Young-Sook;Lee, Hae-Eun;Park, Ju-Yeon;Woo, Kyung-Ja
    • Food Science and Biotechnology
    • /
    • v.15 no.1
    • /
    • pp.77-81
    • /
    • 2006
  • The dextransucrase activity of microorganisms which were identified as contributing to the fermentation of jeungpyeon made with yeast was measured. The dextran generated during fermentation was quantified and the viscosity changes were measured. The mechanism of network structure formation was clarified by observing the inside of the network structure over the fermentation periods ranging from 1 to 7 hr using scanning electron microscopy (SEM). The pH of jeungpyeon batter decreased significantly as the fermentation proceeded, whereas the viscosity increased. The identified lactic acid bacteria (LAB) were Leuconostoc mesenteroides subsp. mesenteroides, Pediococcus pentosaceus, Tetragenococcus halophilus, and Leuconostoc mesenteroides subsp. dextranicum. The yeast was identified as Saccharomyces cerevisiae A/Tor. Pretorien. The dextransucrase extracted from those microorganisms showed high activity. On the other hand, the amount of dextran generated from the batter increased significantly beyond 2 hr of fermentation, and the viscosity increment showed a similar trend. The SEM photos showed that the most homogeneous fine network structure was observed in the batter fermented for 2 hr. Therefore, we assumed that the dextran that was generated by microorganisms during fermentation interacted with the components of the batter to increase the stability of the network structure.

Detection and Prevention of Bypassing Attack on VLAN-Based Network Segmentation Environment (VLAN을 이용한 네트워크 분할 환경에서의 네트워크 접근 제어 우회 공격 탐지 및 방어 기법)

  • Kim, Kwang-jun;Hwang, Kyu-ho;Kim, In-kyoung;Oh, Hyung-geun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.449-456
    • /
    • 2018
  • Many organizations divide the network to manage the network in order to prevent the leakage of internal data between separate organizations / departments by sending and receiving unnecessary traffic. The most fundamental network separation method is based on physically separate equipment. However, there is a case where a network is divided and operated logically by utilizing a virtual LAN (VLAN) network access control function that can be constructed at a lower cost. In this study, we first examined the possibility of bypassing the logical network separation through VLAN ID scanning and double encapsulation VLAN hopping attack. Then, we showed and implemented a data leak scenario by utilizing the acquired VLAN ID. Furthermore, we proposed a simple and effective technique to detect and prevent the double encapsulation VLAN hopping attack, which is also implemented for validation. We hope that this study improves security of organizations that use the VLAN-based logical network separation by preventing internal data leakage or external cyber attack exploiting double encapsulation VLAN vulnerability.

A Study and Design of Beam Scanning Array Antenna using IR-UWB (IR-UWB를 이용한 빔 스캐닝 배열 안테나 설계 및 연구)

  • Kim, Keun-Yong;Kang, Eun-Kyun;Kim, Jin-Woo;Ra, Keuk-Whan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.194-201
    • /
    • 2014
  • This paper is able to be solved by improving degradation in multi-path environment by adjust beam pattern angle through modifying pulse phase of each antennas by using TRM (Transmitter Receiver Module). Beam Scanning Array Antenna, which is transmitter/receiver that improves degradation in multi-path environment without any signal distortion, is designed and manufactured. Beam Scanning Array Antenna should be able to send/receive signal at the antenna's longitudinal part without distortion and should not influences other systems. Also, it should include target detecting ability by beam steering.Dispersion characteristic of Beam Scanning Antenna, which is designed, is analysed by using fidelity, and steering and radar resolution performance is verified by using $1cm{\times}1cm$ sized target. To manufacture Beam Scanning Array Antenna, control board and GUI, which is able to control Vivaldi Antenna for IR-UWB, Tri-Band Wilkinson power divider, and TRM (Transmitter Receiver Module), is designed. Throughout this research, developed Beam Scanning UWB Array Antenna system is adoptable for radar application field. and time domain analysis techniques by using network analyser made the antenna characteristics analysis for setting up antenna more accurate. In addition, it makes beam width checking without difficulties.

Identification of the microstructural components of crumb rubber modified asphalt binder (CRMA) and the feasibility of using environmental scanning electron microscopy (ESEM) coupled with energy dispersive X-Ray spectroscopy (EDX) (ESEM과 EDX를 사용한 CRM 바인더의 미세구조 성분 분석)

  • Kim, Hyun Hwan;Mithil, Mazumder;Lee, Moon Sup;Lee, Soon Jae
    • International Journal of Highway Engineering
    • /
    • v.18 no.6
    • /
    • pp.41-50
    • /
    • 2016
  • OBJECTIVES : In this study, microstructural components of crumb rubber modified asphalt (CRMA) binder were investigated using environmental scanning electron microscope (ESEM). To clearly understand the elemental composition of the CRMA binder, energy dispersive X-ray spectroscopy (EDX) was employed on the ESEM samples. METHODS : CRMA binders were produced using open blade mixers at $177^{\circ}C$ for 30 min. The binders were artificially aged through a series of accelerated aging processes. Sample preparation was done by making a mold shape on the glass slide. Thereafter, the morphology of the CRMA binder was observed using the ESEM coupled with the EDX. RESULTS : The images captured from the ESEM indicate that the unaged CRMA binder appears to have a single-phase continuous nonuniform structure after the addition of crumb rubber particles, whereas the artificially aged CRMA binder was observed to have two different phases. ESEM coupled with EDX shows detailed internal structure of the modified binders compared to other technologies (i.e., optical microscopy, atomic force microscopy, and conventional scanning electron microscope). CONCLUSIONS : The captured images resemble the internal structures such as the viscous properties of the unaged CRMA binder and the interaction between the rubber particles and the base binder at aged condition. ESEM is a powerful instrument and with the introduction of EDX, it provided more details of the network microstructure of the asphalt binder. ESEM coupled with EDX is recommended for use in future investigation of microstructure of asphalt binders.

Two Flexible Loops in Subtilisin-like Thermophilic Protease, Thermicin, from Thermoanaerobacter yonseiensis

  • Jang, Hyeung-Jin;Lee, Chang-Hun;Lee, Weon-Tae;Kim, Yu-Sam
    • BMB Reports
    • /
    • v.35 no.5
    • /
    • pp.498-507
    • /
    • 2002
  • A gene that encodes a thermostable protease, coined thermicin, has been isolated from Thermoanaerobacter yonseiensis that is expressed and characterized in E. coli.. In order to elucidate the molecular characteristics on thermostability of the enzyme, molecular modeling and mutagenesis technology were applied. In the modeling structure, the structural core, including the active site, was well conserved; whereas, the two loop regions were unique when compared to thermitase. The mutant enzyme with the small loop deleted (D190-I196), based on modeling structural information, showed identical enzyme activity. However, when the large loop was deleted (P233-P244), a little lower $K_m$ and even a lower kcat was found. This indicates that the large loop could influence catalytic activity. However, the unfolding temperature ($T_m$), which was determined by a differential-scanning calorimetry for the mutant enzyme deleted the small loop, was $96^{\circ}C$. This is $14^{\circ}C$ lower than that for the parent thermicin. These results suggest that the small loop may play a role in maintaining the proper folding of the enzyme at high temperatures, whereas the large loop might be related to catalysis.

A Study of Internet Worm Detection & Response Method Using Outbound Traffic (OutBound 트래픽을 이용한 인터넷 웜 탐지 및 대응 방안 연구)

  • Lee, Sang-Hun
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.75-82
    • /
    • 2006
  • Internet worm gives various while we paralyze the network and flow the information out damages. In this paper, I suggest the method to prevent this. This method detect internet worm in PC first. and present the method to do an automatic confrontation. This method detect a traffic foundation network scanning of internet worm which is the feature and accomplish the confrontation. This method stop the process to be infected at the internet worm and prevent that traffic is flowed out to the outside. and This method isolate the execution file to be infected at the internet worm and move at a specific location for organizing at the postmortem so that we could accomplish the investigation about internet worm. Such method is useful to the radiation detection indication and computation of unknown internet worm. therefore, Stable network operation is possible through this method.

  • PDF

Microstructure of Tool Steel Castings for Cold-Work Die Inserts (냉간금형 인서트(insert)용 주강의 미세조직)

  • Kang, Jun-Yun;Park, Jun-Young;Kim, Hoyoung;Kim, Byunghwan
    • Journal of the Korean Society for Heat Treatment
    • /
    • v.30 no.5
    • /
    • pp.197-206
    • /
    • 2017
  • The microstructure of a high-carbon and high-chromium cast steel (HK700) for cold-work die inserts was analyzed by advanced scanning electron microscopy. A continuous network of primary $M_7C_3$ carbide was developed among austenitic matrix after casting. A small amount of $M_2C$ was added to the carbide network owing to the enrichment of Mo and W during the solidification. After quenching in which the austenitization was performed at $1030^{\circ}C$ and double tempering at $520^{\circ}C$, the network structure of $M_7C_3$ was preserved while most of the matrix was transformed to martensite because of additional carbide precipitation. The $M_2C$ in the as-cast microstructure was also transformed to $M_6C$ due to its instability. The continuous network of coarse carbides owing to the absence of hot-working had little influence on the hardness after quenching and tempering, whereas it resulted in severe brittleness upon flexural loading.

An Ultrathin Polymer Network through Polyion-Complex by Using Sodium Dioctadecyl Sulfate as Monolayer Template

  • Lee, Burm-Jong;Kim, Hee-Sang;Kim, Seong-Hoon;Son, Eun-Mi;Kim, Dong-Kyoo;Shin, Hoon-Kyu;Kwon, Young-Su
    • Bulletin of the Korean Chemical Society
    • /
    • v.23 no.4
    • /
    • pp.575-579
    • /
    • 2002
  • Two-dimensionally cross-linked ultrathin films of poly(maleic acid-alt-methyl vinyl ether) (MA-MVE) and poly(allylamine) (PAA) were produced by using sodium dioctadecyl sulfate (2C18S) as the monolayer template for Langmuir-Blodgett (LB) depositio n. The template molecules were subsequently removed by thermal treatment followed by extraction. The polyion-complexed monolayers of three components, i.e., template 2C18S, co-spread PAA, and subphase MA-MVE, were formed at the air-water interface. Their monolayer properties were studied by the surface pressure-area isotherm. The monolayers were transferred on solid substrates as Y type. The polyion-complexed LB films and the resulting network films were characterized by FT-IR spectroscopy, X-ray photoelectron spectroscopy (XPS), and scanning electron microscopy (SEM). The cross-linking to form a polymer network was achieved by amide or imide formation through heat treatment under a vacuum. SEM observation of the film on a porous fluorocarbon membrane filter (pore diameter 0.1 ㎛) showed covering of the pores by four layers in the polyion complex state. Extraction by chloroform followed by heat treatment produced hole defects in the film.

Dual deep neural network-based classifiers to detect experimental seizures

  • Jang, Hyun-Jong;Cho, Kyung-Ok
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.23 no.2
    • /
    • pp.131-139
    • /
    • 2019
  • Manually reviewing electroencephalograms (EEGs) is labor-intensive and demands automated seizure detection systems. To construct an efficient and robust event detector for experimental seizures from continuous EEG monitoring, we combined spectral analysis and deep neural networks. A deep neural network was trained to discriminate periodograms of 5-sec EEG segments from annotated convulsive seizures and the pre- and post-EEG segments. To use the entire EEG for training, a second network was trained with non-seizure EEGs that were misclassified as seizures by the first network. By sequentially applying the dual deep neural networks and simple pre- and post-processing, our autodetector identified all seizure events in 4,272 h of test EEG traces, with only 6 false positive events, corresponding to 100% sensitivity and 98% positive predictive value. Moreover, with pre-processing to reduce the computational burden, scanning and classifying 8,977 h of training and test EEG datasets took only 2.28 h with a personal computer. These results demonstrate that combining a basic feature extractor with dual deep neural networks and rule-based pre- and post-processing can detect convulsive seizures with great accuracy and low computational burden, highlighting the feasibility of our automated seizure detection algorithm.