• Title/Summary/Keyword: One-IP System

Search Result 256, Processing Time 0.03 seconds

THE AFFINITY OF CALMODULIN-AFFIGEL FOR INOSITOL TRIPHOSPHATE KINASE FROM BOVINE BRAIN (소의 뇌 Inositol triphosphate kinase와 Calmodulin-Affigel과의 친화도)

  • Lim, Sung-Woo;Kim, Jung-Hye
    • Journal of Yeungnam Medical Science
    • /
    • v.7 no.1
    • /
    • pp.39-50
    • /
    • 1990
  • The one event on signalling mechanism is the cleavage by adenyl cyclase of ATP into second messenger, cyclic AMP. The other transfer system of inositol metabolism. it is widely recognized that hydrolysis of the minor membrane lipid phosphoinositide bisphosphate($PIP_2$) initiated by occupation of certain receptors and catalyzed by phospholipase C, lead to toe generation of the two intracellular messengers, inositol triphosphate($IP_3$) and diacylglycerol(DG). $IP_3$ is converted to inositol tetrakisphosphate($IP_4$) by $IP_3$ kinase. In the present study, it is that purification of calmodulin is used by phenyl-Sepharose CL-4B chromatography. it's molecular weigh, 17.000 in SDS-polyacrylamide gel electrophoresis. In order to observe the affinity between calmodulin (CaM)-Affigel 15 and $IP_3$ kinase, and isolated $IP_3$ kinase, was applied in CaM-Affigel with $Ca^{2+}$ equilibirum buffer and EGTA equilibirum buffer. We compared with binding and elution effect of $IP_3$ kinase in several condition of buffer. In affinity of binding. $Ca^{2+}$ equilibrium buffer was in the most proper condition. and elution, CaM/$Ca^{2+}$ buffer(CE1 10.36, CE2 12. 76pM/min/mg of protein) was effected much more than EGTA buffer(E2 1.48, E3 2.43pM/min/mg of protein), but CaM/$Ca^{2+}$ stimulate the activity of $IP_3$ kinase. And then, several detergents such as sodium deoxycholate, tween 20. cholic acid, polyethylene glycol, chaps were applied. The 0.2% chaps buffer(E2 23.19, E3 8.05pM/min/mg of protein) was the most effective in elution of $IP_3$ kinase.

  • PDF

Steganographic Model based on Low bit Encoding for VoIP (VoIP 환경을 위한 Low bit Encoding 스테가노그라픽 모델)

  • Kim, Young-Mi
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.141-150
    • /
    • 2007
  • This paper proposes new Steganographic model for VoIP that has very effective method using low bit encoding. Most of Steganographic models using Low bit Encoding have two disadvantages; one is that the existence of hidden secret message can be easily detected by auditory, the other is that the capacity of stego data is low. To solve these problems, this method embed more than one bit in inaudible range, so this method can improve the capacity of the hidden message in cover data. The embedding bit position is determined by using a pseudo random number generator which has seed with remaining message length, so it is hard to detect the stego data produced by the proposed method. This proposed model is able to use not only to communicate wave file with hidden message in VoIP environment but also to hide vary information which is user basic information, authentication system, etc.

  • PDF

A Study on the Multi-Dimensional Interactivity in IP-Based Interactive Media: e-Learning Service Case (IP기반 양방향 매체에서의 다차원적 상호작용에 관한 연구: e-러닝 서비스를 중심으로)

  • Lee, Ji-Eun;Shin, Min-Soo
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.39-64
    • /
    • 2008
  • As digital convergence evolves, it is expected that the market of IP-based services like VoIP and IPTV will be expanded. In particular, IPTV market is expected to attract consumers' attention through various interactive services offering a variety of experiences to consumers. Interactivity sets apart old media from new one in terms of how to mediate effects of user satisfaction. The object of this study is to investigate (1) multi-dimensional Interactivities in an interactive medium based on IP and relationship among them, and (2) significant factors affecting cognitive absorption of interactive media users. This study aims to provide implications on how to develop strategies for IP-based media including e-learning system.

Design and Implementation of Active Measurement Tool for One-way IP Performance Measurement (단방향 IP 성능 측정을 위한 능동적 측정 도구의 설계 및 구현)

  • 정재훈;박재우;이영석;신효정;서영일;최양희
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.211-213
    • /
    • 2001
  • 본 논문에서는 비대칭적인 인터넷에서의 단방향 지연시간, 지연시간 편차 및 손실률을 측정 할 수 있는 시스템구조를 제시하고, 구현된 측정도구를 이용하여 측정한 결과를 제시한다. 제안된 구조에서는 단방향성 IP 성능 인자의 측정에 반드시 필요한 측정기계들간의 시간 동기화를 위해서 Global Positioning System(GPS)을 이용하여 Micro-second 수준의 정밀도를 제공한다. 그리고, 측정의 정확도를 향상시키기 위하여 송신자 및 수신자가 이더넷 프레임 처리 직전에 시간 정보를 기록하여 프로토콜 계층간의 이동에 의한 지연시간을 줄이고 있다. 본 논문에서는 구현한 측정 도구를 인터넷에 적용하여 단방향성 IP 성능 인자를 얻는다. 또한 이 측정결과를 통해 단방향 측정의 필요성을 제시한다.

Web-based Distribute Control Networks

  • Kiwon Song;Kim, Jonghwi;Park, Gi-Sang;Park, Gi-Heung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.82.4-82
    • /
    • 2001
  • Requirements for device control networks differ greatly from those of data (business) networks. Consequently, any control network which uses a filedbus protocol is, in general, different from If network protocol TCP/IP. One then needs to integrate both fieldbus protocol and TCP/IP to realize distributed control over IP network or internet. LonWorks technology provides networked intelligent I/O and controllers which make it a powerful, expandable solution. Connecting these remote Lon Works networks to the Internet can provide a powerful, integrated, distributed control system. This paper suggests a basic concept that be applied to distributed control over IP network or internet. Specially, Lonworks technology that used LonTalk protocol is reviewed as device network and ...

  • PDF

Development of the CAD Conferencing System for Real-time Design Collaboration (실시간 협업 설계를 위한 CAD 컨퍼런싱 시스템 개발)

  • 김광운;전용태;정태형
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.531-535
    • /
    • 2002
  • This paper presents a real-time collaborative system for distributed design. The aim of the system is to provide designers with a virtual workspace where they can collaborate and exchange their design knowledge in distributed environment. The system consists of two subsequent modules. One is for the visualization of design data including CAD data, documents, images, and the other is real-time collaboration module. They make it possible for distributed designers to review the design data collaboratively and to share their design knowledge. The system was implemented by using the Internet protocols such as TCP/IP and IP multicast on the peer-to-peer based network. An example is presented and discussed to validate the proposed system.

  • PDF

The Remote Monitoring System for Baby using by PDA (PDA를 이용한 유아 원격 감시 시스템)

  • Lee, Jeong-Ick
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1779-1782
    • /
    • 2009
  • The developed system is captured by RS-232 telecommunication receiving data (temperature and humidity of each incubator) through radio frequency sensor network system and is made by monitoring system for one person collecting each channel data. This monitoring system is capable of monitoring not only PDA through TCP/IP telecommunication but also personal computer. This system is actively application on telecommunication function of LabVIEW and PDA module and is considerably saved in processing time than using in other tools.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

Implementation of Safety management broadcasting system for IoT based in IP PBX (IP PBX기반 안전관리 IoT 방송 시스템 구현)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.9-14
    • /
    • 2019
  • Currently, with the success of 5G commercialization, a server system that integrates various Internet public safety services should be developed. In this paper, we developed a public safety integrated server, which is an IoT platform connecting IoT device and IoT gateway based on IP PBX. This server is based on embedded OS and various IoT services are executed in one system and call processing / broadcasting server function that processes emergency call and emergency broadcasting in public places is built in. This system collects IoT sensor data and emergency bell information and automatically sends out emergency alarms, emergency evacuation broadcasts, etc. at an accident site in an emergency situation, and transmits the daily information to the upper IoT service server, Provide public safety management services.

A Study of Internet Address Collision Detection Method (인터넷 주소 충돌 감지에 관한 연구)

  • 위선정;임영희;이태헌;박기홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.545-547
    • /
    • 2004
  • Currently possibility of the change of seal computer it increases geometrical progression and the general individuals the knowledge which is special regarding the ip are using the flow child blood which it Provides without from the isp enterprise. But most of the case peon of the school which uses the fixation child blood or the company because is not the knowledge against a TCP/IP address is not oneself at deliberation or real income and it will use the TCP/IP address of the different user and the network whole it will paralyze, the original user will not be able to use the network and it makes. With information where address information where the network administrator present time after data base anger one uses address information of the civil official objective personal computers and network systems of the watch inside in the dictionary is stored will be same from the dissertation which it sees hereupon and the web which it will yell it leads and packet it detects, the use of the TCP/IP address which goes wrong in the user and it notifies the method which is the possibility of closing the paralysis of the network system which it follows in the IP address fringe land due to a deliberation or a real income to sleep it presents it does.

  • PDF