• Title/Summary/Keyword: Network Targeting

Search Result 274, Processing Time 0.034 seconds

Data Dissemination in Wireless Sensor Networks with Instantly Decodable Network Coding

  • Gou, Liang;Zhang, Gengxin;Bian, Dongming;Zhang, Wei;Xie, Zhidong
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.846-856
    • /
    • 2016
  • Wireless sensor networks (WSNs) are widely applied in monitoring and control of environment parameters. It is sometimes necessary to disseminate data through wireless links after they are deployed in order to adjust configuration parameters of sensors or distribute management commands and queries to sensors. Several approaches have been proposed recently for data dissemination in WSNs. However, none of these approaches achieves both high efficiency and low complexity simultaneously. To address this problem, cluster-tree based network architecture, which divides a WSN into hierarchies and clusters is proposed. Upon this architecture, data is delivered from base station to all sensors in clusters hierarchy by hierarchy. In each cluster, father broadcasts data to all his children with instantly decodable network coding (IDNC), and a novel scheme targeting to maximize total transmission gain (MTTG) is proposed. This scheme employs a new packet scheduling algorithm to select IDNC packets, which uses weight status feedback matrix (WSFM) directly. Analysis and simulation results indicate that the transmission efficiency approximate to the best existing approach maximum weight clique, but with much lower computational overhead. Hence, the energy efficiency achieves both in data transmission and processing.

A Low Power Asynchronous MSP430 Processor for Ubiquitous Sensor Network (편재형 센서네트워크 노드를 위한 저전력 비동기 MSP430 프로세서)

  • Shin, Chi-Hoon;Shang, Belong;Oh, Myeong-Hoon;Kim, Young-Woo;Kim, Sung-Nam;Yakovlev, Alex;Kim, Sung-Woon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.451-453
    • /
    • 2007
  • This paper describes the design of an asynchronous implementation of a sensor network processor. The main purpose of this work is the reduction of power consumption in sensor network node processors and the research presented here tries to explore the suitability of asynchronous circuits for this purpose. The Handshake Solutions toolkit is used to implement an asynchronous version of a sensor processor. The design is made compact, trading area and leakage power savings with dynamic power costs, targeting the typical sparse operating characteristics of sensor node processors. It is then compared with a synchronous version of the same processor. Both versions are then compared with existing commercial processors in terms of power consumption.

  • PDF

Relationship Analysis of Field Work in Beam-Column System Frame Work of the Precast Concrete Public Apartment Building (보-기둥구조 PC공동주택 골조공사 작업관계 분석)

  • Kim, Ki-Ho;Kim, Jin-Won;Kim, MIn-Jun;Lee, Dong-Gun;Sohn, Jeong-Rak;Lee, Bum-Sik
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.11a
    • /
    • pp.41-42
    • /
    • 2022
  • This study analyzed the process related to the linkage between on-site work targeting the middle size Precast Concrete(PC) public apartment building with beam-column system and prepared on-site works flow relationship diagram in which the wet process consists of core Critical Path(CP) to prepare a network diagram of the Precedence Diagram Method(PDM). Through this study, it is expected that it will be possible to maximize the project management capability by suggesting a method to minimize risk factors and the optimized process management of the beam-column system PC public apartment building.

  • PDF

Developing a Framework for Detecting Phishing URLs Using Machine Learning

  • Nguyen Tung Lam
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.157-163
    • /
    • 2023
  • The attack technique targeting end-users through phishing URLs is very dangerous nowadays. With this technique, attackers could steal user data or take control of the system, etc. Therefore, early detecting phishing URLs is essential. In this paper, we propose a method to detect phishing URLs based on supervised learning algorithms and abnormal behaviors from URLs. Finally, based on the research results, we build a framework for detecting phishing URLs through end-users. The novelty and advantage of our proposed method are that abnormal behaviors are extracted based on URLs which are monitored and collected directly from attack campaigns instead of using inefficient old datasets.

Roofline-based Data Migration Methodology for Hybrid Memories

  • Jongmin Lee;Kwangho Lee;Mucheol Kim;Geunchul Park;Chan Yeol Park
    • Journal of Internet Technology
    • /
    • v.21 no.3
    • /
    • pp.849-859
    • /
    • 2020
  • High-performance computing (HPC) systems provide huge computational resources and large memories. The hybrid memory is a promising memory technology that contains different types of memory devices, which have different characteristics regarding access time, retention time, and capacity. However, the increasing performance and employing hybrid memories induce more complexity as well. In this paper, we propose a roofline-based data migration methodology called HyDM to effectively use hybrid memories targeting at Intel Knight Landing (KNL) processor. HyDM monitors status of applications running on a system and migrates pages of selected applications to the High Bandwidth Memory (HBM). To select appropriate applications on system runtime, we adopt the roofline performance model, a visually intuitive method. HyDM also employs a feedback mechanism to change the target application dynamically. Experimental results show that our HyDM improves over the baseline execution the execution time by up to 44%.

Isolation of Mouse Ig Heavy and Light Chain Genomic DNA Clones, and Construction of Gene Knockout Vector for the Generation of Humanized Xenomouse (인간 단클론 항체 생산용 Humanized Xenomouse 제작의 기초 소재인 생쥐 Ig 중사슬 및 경사슬 Genomic DNA 클론의 확보 및 유전자 적중 벡터의 제작)

  • Lee, Hee-kyung;Cha, Sang-hoon
    • IMMUNE NETWORK
    • /
    • v.2 no.4
    • /
    • pp.233-241
    • /
    • 2002
  • Background: Monoclonal antibodies (mAb) of rodent origin are produced with ease by hybridoma fusion technique, and have been successfully used as therapeutic reagents for humans after humanization by genetic engineering. However, utilization of these antibodies for therapeutic purpose has been limited by the fact that they act as immunogens in human body causing undesired side effects. So far, there have been several attempts to produce human mAbs for effective in vivo diagnostic or therapeutic reagents including the use of humanized xenomouse that is generated by mating knockout mice which lost Ig heavy and light chain genes by homologous recombination and transgenic mice having both human Ig heavy and light gene loci in their genome. Methods: Genomic DNA fragments of mouse Ig heavy and light chain were obtained from a mouse brain ${\lambda}$ genomic library by PCR screening and cloned into a targeting vector with ultimate goal of generating Ig knockout mouse. Results: Through PCR screening of the genomic library, three heavy chain and three light chain Ig gene fragments were identified, and restriction map of one of the heavy chain gene fragments was determined. Then heavy chain Ig gene fragments were subcloned into a targeting vector. The resulting construct was introduced into embryonic stem cells. Antibiotic selection of transfected cells is under the progress. Conclusion: Generation of xenomouse is particularly important in medical biotechnology. However, this goal is not easily achieved due to the technical difficulties as well as huge financial expenses. Although we are in the early stage of a long-term project, our results, at least, partially contribute the successful generation of humanized xenomouse in Korea.

The CD28-B7 Family in Anti-Tumor Immunity: Emerging Concepts in Cancer Immunotherapy

  • Leung, Joanne;Suh, Woong-Kyung
    • IMMUNE NETWORK
    • /
    • v.14 no.6
    • /
    • pp.265-276
    • /
    • 2014
  • The interactions between B7 molecules and CD28-family receptors are crucial in the regulation of adaptive cellular immunity. In cancer, the aberrant expression of co-inhibitory B7 molecules has been attributed to reduced anti-tumor immunity and cancer immune evasion, prompting the development of cancer therapeutics that can restore T cell function. Murine tumor models have provided significant support for the targeting of multiple immune checkpoints involving CTLA-4, PD-1, ICOS, B7-H3 and B7-H4 during tumor growth, and clinical studies investigating the therapeutic effects of CTLA-4 and PD-1 blockade have shown exceptionally promising results in patients with advanced melanoma and other cancers. The expression pattern of co-inhibitory B7 ligands in the tumor microenvironment has also been largely correlated with poor patient prognosis, and recent evidence suggests that the presence of several B7 molecules may predict the responsiveness of immunotherapies that rely on pre-existing tumor-associated immune responses. While monotherapies blocking T cell co-inhibition have beneficial effects in reducing tumor burden, combinatorial immunotherapy targeting multiple immune checkpoints involved in various stages of the anti-tumor response has led to the most substantial impact on tumor reduction. In this review, we will examine the contributions of B7- and CD28-family members in the context of cancer development, and discuss the implications of current human findings in cancer immunotherapy.

A Study on the Application of Topic Modeling for the Book Report Text (독후감 텍스트의 토픽모델링 적용에 관한 탐색적 연구)

  • Lee, Soo-Sang
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.4
    • /
    • pp.1-18
    • /
    • 2016
  • The purpose of this study is to explore application of topic modeling for topic analysis of book report. Topic modeling can be understood as one method of topic analysis. This analysis was conducted with texts in 23 book reports using LDA function of the "topicmodels" package provided by R. According to the result of topic modeling, 16 topics were extracted. The topic network was constructed by the relation between the topics and keywords, and the book report network was constructed by the relation between book report cases and topics. Next, Centrality analysis was conducted targeting the topic network and book report network. The result of this study is following these. First, 16 topics are shown as network which has one component. In other words, 16 topics are interrelated. Second, book report was divided into 2 groups, book reports with high centrality and book reports with low centrality. The former group has similarities with others, the latter group has differences with others in aspect of the topics of book reports. The result of topic modeling is useful to identify book reports' topics combining with network analysis.

Study on Internet of Things Based Low-Power Wireless Sensor Network System for Wild Vegetation Communities Ecological Monitoring (야생식생군락 생태계 모니터링을 위한 사물인터넷 기반의 저전력 무선 센서네트워크 시스템에 관한 연구)

  • Kim, Nae-Soo;Lee, Kyeseon;Ryu, Jaehong
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.159-173
    • /
    • 2015
  • This paper presents a study on the Internet of Things based low-power wireless sensor networks for remote monitoring of wildlife ecosystem due to climate change. Especially, it is targeting the wild vegetation communities ecological monitoring. First, we performed a pre-test and analysis for selecting the appropriate frequency for the sensor network to collect and deliver information reliably in harsh propagation environment of the forest area, and selected for sensors for monitoring wild vegetation communities on the basis of considerations for selecting the best sensor. In addition, we have presented the platform concept and hierarchical function structures for effectively monitoring, analyzing and predicting of ecosystem changes, to apply the Internet of Things in the ecological monitoring area. Based on this, this paper presents the system architecture and design of the Internet of Things based low-power wireless sensor networks for monitoring the ecosystem of the wild vegetation communities. Finally, we constructed and operated the test-bed applied to real wild trees, using the developed prototype based on the design.

Social Network Games (SNG) to concentrate on the analysis of causes (소셜네트워크 게임(SNG)에 몰입하는 원인 분석 연구)

  • Kim, Tae-Gyu;Ryu, Seuc-Ho;Kyung, Byung-Pyo;Lee, Wan-Bok
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.445-453
    • /
    • 2012
  • With the development of recent gaming industry in the production side of the game has expressed concern about. To avoid such generalizations about the diversification of the game for any effort is required. As an aspect of the game is that social networks are emerging. In particular, the element of commitment to targeting the public should not be in game development is an important factor in the liver. In this study, the analysis of previous studies on flow and Raph Koster fun theory is based on the theory extracted from the social network game cause flow through the case study is presented.