• Title/Summary/Keyword: Non-Public Network

Search Result 150, Processing Time 0.029 seconds

Gene Co-expression Network Analysis Associated with Acupuncture Treatment of Rheumatoid Arthritis: An Animal Model

  • Ravn, Dea Louise;Mohammadnejad, Afsaneh;Sabaredzovic, Kemal;Li, Weilong;Lund, Jesper;Li, Shuxia;Svendsen, Anders Jorgen;Schwammle, Veit;Tan, Qihua
    • Journal of Acupuncture Research
    • /
    • v.37 no.2
    • /
    • pp.128-135
    • /
    • 2020
  • Background: Classical acupuncture is being used in the treatment of rheumatoid arthritis (RA). To explore the biological response to acupuncture, a network-based analysis was performed on gene expression data collected from an animal model of RA treated with acupuncture. Methods: Gene expression data were obtained from published microarray studies on blood samples from rats with collagen induced arthritis (CIA) and non-CIA rats, both treated with manual acupuncture. The weighted gene co-expression network analysis was performed to identify gene clusters expressed in association with acupuncture treatment time and RA status. Gene ontology and pathway analyses were applied for functional annotation and network visualization. Results: A cluster of 347 genes were identified that differentially downregulated expression in association with acupuncture treatment over time; specifically in rats with CIA with module-RA correlation at 1 hour after acupuncture (-0.27; p < 0.001) and at 34 days after acupuncture (-0.33; p < 0.001). Functional annotation showed highly significant enrichment of porphyrin-containing compound biosynthetic processes (p < 0.001). The network-based analysis also identified a module of 140 genes differentially expressed between CIA and non-CIA in rats (p < 0.001). This cluster of genes was enriched for antigen processing and presentation of exogenous peptide antigen (p < 0.001). Other functional gene clusters previously reported in earlier studies were also observed. Conclusion: The identified gene expression networks and their hub-genes could help with the understanding of mechanisms involved in the pathogenesis of RA, as well understanding the effects of acupuncture treatment of RA.

A Study for the Reform of Public Housing Welfare Delivery System (주거복지 공적 전달체계 개편방안 연구 - 통합적 지역거점 구축방안을 중심으로 -)

  • Lee, Jong-Kwon;Kim, Kyeong-Mi
    • Journal of the Korean housing association
    • /
    • v.27 no.4
    • /
    • pp.33-46
    • /
    • 2016
  • In era of lowbirth, aging population, low growth and social polarization, the effective welfare delivery systems are taking on added significance than past years. Public housing welfare resources, such as public rental housing, housing voucher, affordable housing loan, are more diversified and expanded. These programs could work effectively by the comprehensive interlink and community based delivery system. From the standpoint of recipients, how effectively the substantial benefits of welfare resources being delivered to each individual is more important than how much welfare resources being produced totally. This study aimed to explore the reform of public housing welfare delivery system. For this purpose, diagnosed the current states and key issues related to public delivery system, and analyzed what kinds of housing welfare services should be strengthened, and finally suggested the collaboration among the public sectors (local government, LH, HUG, HF etc.) and the partnership with non-profit organizations. Main research implications are as follows. The main housing welfare services which could be categorized as the housing welfare center's role are advice & information offering, several public resources interlink and accessibility improvement, community based network construction, etc. And the most important key for successful delivery system reorganization is the collaborative operation of the public sectors and local government, non-profit organizations.

The extent of the role of internal control of Northern Borders University in maintaining the non-waste of public money

  • Oweis, Khaled Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.187-199
    • /
    • 2021
  • The research aims to measure the control procedures' effectiveness, followed by the University of Northern Borders employees. A questionnaire was developed and distributed to the target sample of financial and auditing affairs employees at the university, where the researcher followed the existing descriptive-analytical approach. The researcher relied on the field survey, and statistical analysis (spss) was used. The researcher has found that the control procedures used are highly efficient in reducing public money waste. The researcher has presented recommendations that may contribute to developing the work of oversight in combating waste of public money. These recommendations include: Increase the interaction between the General Oversight Office and the internal oversight departments at the University of Northern Borders, the incentives provided to the oversight and accounting staff for their efforts to combat public money waste. It encourages them to maintain public money and work to obliging employees to undertake training courses periodically to develop their skills and rehabilitate them in line with modern control procedures. Also, more studies and scientific research on the waste of public money and types of administrative and financial Corruption and the law in all state sectors and reach conclusions and recommendations will help decision-makers amend laws and regulations to serve the public benefit of the university and the state.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Cryptographic Protocols using Semidirect Products of Finite Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.17-27
    • /
    • 2021
  • Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to non-abelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.

A Survey of Public-Key Cryptography over Non-Abelian Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.289-300
    • /
    • 2021
  • Non-abelian group based Cryptography is a field which has become a latest trend in research due to increasing vulnerabilities associated with the abelian group based cryptosystems which are in use at present and the interesting algebraic properties associated that can be thought to provide higher security. When developing cryptographic primitives based on non-abelian groups, the researchers have tried to extend the similar layouts associated with the traditional underlying mathematical problems and assumptions by almost mimicking their operations which is fascinating even to observe. This survey contributes in highlighting the different analogous extensions of traditional assumptions presented by various authors and a set of open problems. Further, suggestions to apply the Hamiltonian Cycle/Path Problem in a similar direction is presented.

Selection method of public transportation vulnerable area using GIS buffering analysis (GIS Buffering기법을 이용한 대중교통취약지구 선정방법)

  • Kim, Yeon-Woong;Chang, Sung-Bong;Jang, Gwang-Woo;Park, Min-Kyu
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1739-1742
    • /
    • 2011
  • Public transportation network in our country is concentrated and advanced focusing on urban area in order to secure economic feasibility. As a result, as dependence on private vehicles is relatively getting higher in public transportation vulnerable area, traffic problem occurs since the average running speed in urban area is 22.5km/h. This paper has an objective to suggest an improvement plan by selecting public transportation vulnerable area, and defining according to urban structure, formation and function, and understand traffic characteristics and draw problems. As a method selecting public transportation vulnerable area, an area with high division rate of vehicle was selected as a primary proposed site by calculating division rate of means of public transportation according to area. Final proposed site was selected by using GIS Buffering technique aiming at selected proposed site, and selecting non-benefit area 500m outside, which is the road limit distance from each subway and bus station. Lastly, the degree of improvement effect was studied by constructing imaginary public transportation network aiming at final proposed site and comparing to the amount of change in division rate of means of transportation.

  • PDF

Analysis of The Application of Information and Innovation Experience in The Training of Public Administration Specialists

  • Smyrnova, Iryna;Akimov, Oleksandr;Krasivskyу, Orest;Shykerynets, Vasyl;Kurovska, Ilona;Hrusheva, Alla;Babych, Andrii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.120-126
    • /
    • 2021
  • The article analyzes the possibility of using information and innovation experience in training public administration specialists, and also explores the system of training public administration and management specialists abroad. It was determined that in the European Union, Japan and other developed countries, three concepts of qualified personnel training will be developed: the concept of specialized training is focused on the present or near future and is relevant for the respective workplace; the concept of multidisciplinary training is effective from an economic point of view, as it increases intra-production and non-production mobility of an employee; the concept of learner-centered learning with the aim of developing human qualities.

A Design for Network Security System via Non-security Common Network (일반망과 보안망을 연계한 네트워크 보안체계 설계)

  • Cho, Chang-Bong;Lee, Sang-Guk;Dho, Kyeong-Cheol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.5
    • /
    • pp.609-614
    • /
    • 2009
  • In this paper, we have proposed a design for security network system passing through the non-security network which is commonly used for various networking services. Based on the security requirements which are assumed that the large classified data are bi-transmitted between a server and several terminals remotely located, some application methods of security techniques are suggested such as the network separation technique, the scale-down application technique of certification management system based on the PKI(Public Key Infrastructure), the double encryption application using the crypto-equipment and the asymmetric keys encryption algorithm, unrecoverable data deleting technique and system access control using USB device. It is expected that the application of this design technique for the security network causes to increase the efficiency of the existing network facilities and reduce the cost for developing and maintaining of new and traditional network security systems.

Open Communication About Reproductive Health Is Associated With Comprehensive HIV Knowledge and a Non-stigmatising Attitude Among Indonesian Youth: A Cross-sectional Study

  • Wirawan, Gede Benny Setia;Gustina, Ni Luh Zallila;Januraga, Pande Putu
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.4
    • /
    • pp.342-350
    • /
    • 2022
  • Objectives: Human immunodeficiency virus (HIV) prevention among youth seems under-prioritised compared to other key populations. HIV knowledge and stigma are important parts of HIV prevention. To inform HIV prevention among youths, this study quantitatively analysed the associations between open communication regarding sexuality and sexual health, comprehensive HIV knowledge, and non-stigmatising attitudes in Indonesia. Methods: This study used data from the Indonesian Demographic and Health Survey (IDHS) 2017. The analysis included unmarried men and women aged 15-25 years old. Comprehensive HIV knowledge and a stigmatising attitude were defined according to the IDHS 2017. Open communication about sexuality and sexual health was defined as the number of people with whom participants could openly discuss these topics in their direct network of friends, family, and service providers, with a scale ranging from 0 to a maximum of 7. Primary analysis used binomial logistic regression with weighting adjustments. Results: The final analysis included 22 864 respondents. Twenty-two percent of youth had no one in their direct network with whom to openly discuss sexual matters, only 14.1% had comprehensive HIV knowledge, and 85.9% showed stigmatising attitudes. Youth mostly discussed sex with their friends (55.2%), and were less likely to discuss it with family members, showing a predominant pattern of peer-to-peer communication. Multivariate analysis showed that having a larger network for communication about sexuality and sexual health was associated with more HIV knowledge and less stigmatising attitudes. Conclusions: Having more opportunities for open sex communication in one's direct social network is associated with more HIV knowledge and less stigmatising attitudes.