• Title/Summary/Keyword: One-way mechanism

Search Result 281, Processing Time 0.027 seconds

Effect of Swiss Ball Exercise on the Muscular Activity of Hamstring during Different Feet Position (양발의 위치에 따른 스위스 볼 운동이 뒤넙다리근 근활성도에 미치는 영향)

  • Jang, Yujin;Yoon, Sukhoon
    • Korean Journal of Applied Biomechanics
    • /
    • v.31 no.3
    • /
    • pp.214-219
    • /
    • 2021
  • Objective: The aim of this study was to evaluate the differences in muscle activity of hamstring muscle depending on the position of the feet during Swiss ball hamstring curl exercise. Method: Total of 15 male participants with no history of hamstring muscle injuries and musculoskeletal disorders in the past 6 months were participated in this study (Age: 29.27 ± 4.96 yrs, Height: 173.47 ± 5.18 cm, Body mass: 75.47 ± 12.50 kg). The muscle activation of semitendinosus and biceps femoris with four different feet positions including neutral stance, internal rotation, external rotation, and wide stance were measured during a Swiss ball hamstring curl exercise. For the analysis, the Swiss ball exercise movement comprised of 3 events (90°→ 0°→ 90°) based on the knee angle and 2 phases relative to the mechanism of muscle contraction (eccentric/concentric contraction). To pursue the study goal, an one-way ANOVA with repeated measures was performed with statistical significance as α = 0.05. Results: There was no statistically significant feet position effect found during the Swiss ball hamstring curl with eccentric contraction phase (p>.05). It is, however, semitendinosus showed an enhanced muscle activation in concentric contraction phase, displaying the highest muscle activity in wide stance and the lowest in external rotation (p<.05). Conclusion: Our findings suggest that this exercise can be beneficial in selectively training the semitendinosus. In other words, Swiss ball hamstring curls performed in wide stance strengthens semitendinosus, which improves the stability of knee and are effective in preventing knee injuries and reinforces rehabilitation.

Fixing Security Flaws of URSA Ad hoc Signature Scheme (URSA 애드혹 서명 알고리즘의 오류 수정)

  • Yi, Jeong-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2007
  • Ad hoc networks enable efficient resource aggregation in decentralized manner, and are inherently scalable and fault-tolerant since they do not depend on any centralized authority. However, lack of a centralized authority prompts many security-related challenges. Moreover, the dynamic topology change in which network nodes frequently join and leave adds a further complication in designing effective and efficient security mechanism. Security services for ad hoc networks need to be provided in a scalable and fault-tolerant manner while allowing for membership change of network nodes. In this paper, we investigate distributed certification mechanisms using a threshold cryptography in a way that the functions of a CA(Certification Authority) are distributed into the network nodes themselves and certain number of nodes jointly issue public key certificates to future joining nodes. In the process, we summarize one interesting report [5] in which the recently proposed RSA-based ad hoc signature scheme, called URSA, contains unfortunate yet serious security flaws. We then propose new scheme by fixing their security flaws.

A Fault Tolerant Data Management Scheme for Healthcare Internet of Things in Fog Computing

  • Saeed, Waqar;Ahmad, Zulfiqar;Jehangiri, Ali Imran;Mohamed, Nader;Umar, Arif Iqbal;Ahmad, Jamil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • Fog computing aims to provide the solution of bandwidth, network latency and energy consumption problems of cloud computing. Likewise, management of data generated by healthcare IoT devices is one of the significant applications of fog computing. Huge amount of data is being generated by healthcare IoT devices and such types of data is required to be managed efficiently, with low latency, without failure, and with minimum energy consumption and low cost. Failures of task or node can cause more latency, maximum energy consumption and high cost. Thus, a failure free, cost efficient, and energy aware management and scheduling scheme for data generated by healthcare IoT devices not only improves the performance of the system but also saves the precious lives of patients because of due to minimum latency and provision of fault tolerance. Therefore, to address all such challenges with regard to data management and fault tolerance, we have presented a Fault Tolerant Data management (FTDM) scheme for healthcare IoT in fog computing. In FTDM, the data generated by healthcare IoT devices is efficiently organized and managed through well-defined components and steps. A two way fault-tolerant mechanism i.e., task-based fault-tolerance and node-based fault-tolerance, is provided in FTDM through which failure of tasks and nodes are managed. The paper considers energy consumption, execution cost, network usage, latency, and execution time as performance evaluation parameters. The simulation results show significantly improvements which are performed using iFogSim. Further, the simulation results show that the proposed FTDM strategy reduces energy consumption 3.97%, execution cost 5.09%, network usage 25.88%, latency 44.15% and execution time 48.89% as compared with existing Greedy Knapsack Scheduling (GKS) strategy. Moreover, it is worthwhile to mention that sometimes the patients are required to be treated remotely due to non-availability of facilities or due to some infectious diseases such as COVID-19. Thus, in such circumstances, the proposed strategy is significantly efficient.

The Effect of Intrinsic and Extrinsic Motivation on Creativity Based on Rewards (보상을 기반으로 내·외적 동기가 창의성에 미치는 영향)

  • Zhang, Hui
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.253-260
    • /
    • 2022
  • Creativity, one of the core competencies of the 21st century, is required as an essential item for members of society. Emphasizes its ability in terms of personality that allows it to be used in the desired direction. However, creativity is considered to contribute to positive change in the organization, not only in creating new ideas or products, but also in adapting to a changing environment and solving problems. Accordingly, by reviewing previous studies, it was concluded that rewards can promote or hinder creativity, which may vary depending on the nature of rewards, the concept of creativity possessed by the researcher, individual differences, and external environment. We also proposed that rewards may influence creativity through motivational, cognitive, and synthetic functions. Based on the analysis, a specific model was proposed for the effect of reward on creativity. This study is based on existing research and analyzed various factors and mechanisms acting in the process of influencing creativity based on comparison of which extrinsic and intrinsic motivations have what kind of relationship. Next, it appears that rewards differ from person to person according to the way they are given in environmental circumstances. Finally, by rewarding various types of creative tasks, an active reward role can be secured.

Quality Improvement through Monitoring of Imported Medicinal Herbs (수입한약재 품목 분석을 통한 품질 제고)

  • Choi, Go-Ya;Ko, Byoung-Seob;Jang, Seol;Chae, Sung-Uk;Lee, Hye-Won;Lee, Mi-Young
    • The Korea Journal of Herbology
    • /
    • v.24 no.4
    • /
    • pp.63-67
    • /
    • 2009
  • Objectives : Quality control for imported medicinal herbs is duty for regulation, however to the best of our knowledge there has been no report regarding quality control of imported ones. Therefore, this study investigated the data of imported ones for monitoring quality issue. Methods : These data are categorized according to item, the amount of import, country, inspection item, suitability, and incongruity reason based on the 248 results performed by KIOM. Results : China is the number one country for import with the value of 73%. Inspected medicinal herbs were 139 species, among them Poria is ranked as top for requested number and the amount of import. The amount of import is similar between high ranking 20 species and low ranking 119 ones, showing high ranking ones are major. The incongruity ratio was 7.7% from the total number of inspected items, the reason for incongruity was excess of tolerable amount of Cd residue. Conclusions : From the data, it is effective way to focus on high ranking herbs for evaluating imported herbs for quality control. The study of mechanism on Cd accumulation and its decrease is essential for environmental matter. And identification and storage for mixed used and easily decomposable herbs are remained for further study. Our study might be small step for showing guideline for proper quality control.

Colony Age of Trichoderma azevedoi Alters the Profile of Volatile Organic Compounds and Ability to Suppress Sclerotinia sclerotiorum in Bean Plants

  • Lincon Rafael, da Silva;Leonardo Luis de Barros, Rodrigues;Amanda Silva, Botelho;Bruna Sartorio, de Castro;Paulo Henrique Pereira Costa, Muniz;Maria Carolina Blassioli, Moraes;Sueli Correa Marques, de Mello
    • The Plant Pathology Journal
    • /
    • v.39 no.1
    • /
    • pp.39-51
    • /
    • 2023
  • Common bean (Phaseolus vulgaris L.) is one of the most important crops in human food production. The occurrence of diseases, such as white mold, caused by Sclerotinia sclerotiorum can limit the production of this legume. The use of Trichoderma has become an important strategy in the suppression of this disease. The aim of the present study was to evaluate the effect of volatile organic compounds (VOCs) emitted by Trichoderma azevedoi CEN1241 in five different growth periods on the severity of white mold in common bean. The in vitro assays were carried out in double-plate and split-plate, and the in vivo assays, through the exposure of the mycelia of S. sclerotiorum to the VOCs of T. azevedoi CEN1241 and subsequent inoculation in bean plants. Chemical analysis by gas chromatography coupled to mass spectrometry detected 37 VOCs produced by T. azevedoi CEN1241, covering six major chemical classes. The profile of VOCs produced by T. azevedoi CEN1241 varied according to colony age and was shown to be related to the ability of the biocontrol agent to suppress S. sclerotiorum. T. azevedoi CEN1241 VOCs reduced the size of S. sclerotiorum lesions on bean fragments in vitro and reduced disease severity in a greenhouse. This study demonstrated in a more applied way that the mechanism of antibiosis through the production of volatile compounds exerted by Trichoderma can complement other mechanisms, such as parasitism and competition, thus contributing to a better efficiency in the control of white mold in bean plants.

Identification of virulence-associated genes of Erwinia amylovora by transposon mutagenesis

  • Seung Yeup Lee;Hyun Gi Kong;In Jeong Kang;Hyeonseok Oh;Hee-Jong Woo;Eunjung Roh
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.2
    • /
    • pp.241-247
    • /
    • 2023
  • Erwinia amylovora , which causes fire blight disease on apple and pear trees, is one of the most important phytopathogens because of its devastating impact. Currently, the only way to effectively control fire blight disease is through the use of antibiotics such as streptomycin, kasugamycin, or oxytetracycline. However, problems with the occurrence of resistant strains due to the overuse of antibiotics are constantly being raised. It is therefore necessary to develop novel disease control methods through an advanced understanding of the pathogenesis mechanism of E. amylovora . To better understand the pathogenesis of E. amylovora , we investigated unknown virulence factors by random mutagenesis and screening. Random mutants were generated by Tn5 transposon insertion, and the pathogenicity of the mutants was assessed by inoculation of the mutants on apple fruitlets. A total of 17 avirulent mutants were found through screening of 960 random mutants. Among them, 14 mutants were already reported as non-pathogenic strains, while three mutants, TS3128_M2899 (ΔSUFU ), TS3128_M2939 (ΔwcaG ), and TS3128_M3747 (ΔrecB ), were not reported. Further study of the association between E. amylovora pathogenicity and these 3 novel genes may provide new insight into the development of control methods for fire blight disease.

Generation of High-Resolution Chest X-rays using Multi-scale Conditional Generative Adversarial Network with Attention (주목 메커니즘 기반의 멀티 스케일 조건부 적대적 생성 신경망을 활용한 고해상도 흉부 X선 영상 생성 기법)

  • Ann, Kyeongjin;Jang, Yeonggul;Ha, Seongmin;Jeon, Byunghwan;Hong, Youngtaek;Shim, Hackjoon;Chang, Hyuk-Jae
    • Journal of Broadcast Engineering
    • /
    • v.25 no.1
    • /
    • pp.1-12
    • /
    • 2020
  • In the medical field, numerical imbalance of data due to differences in disease prevalence is a common problem. It reduces the performance of a artificial intelligence network, leading to difficulties in learning a network with good performance. Recently, generative adversarial network (GAN) technology has been introduced as a way to address this problem, and its ability has been demonstrated by successful applications in various fields. However, it is still difficult to achieve good results in solving problems with performance degraded by numerical imbalances because the image resolution of the previous studies is not yet good enough and the structure in the image is modeled locally. In this paper, we propose a multi-scale conditional generative adversarial network based on attention mechanism, which can produce high resolution images to solve the numerical imbalance problem of chest X-ray image data. The network was able to produce images for various diseases by controlling condition variables with only one network. It's efficient and effective in that the network don't need to be learned independently for all disease classes and solves the problem of long distance dependency in image generation with self-attention mechanism.

Synchronization of Network Interfaces in System Area Networks (시스템 에어리어 네트?에서의 동기화 기법)

  • Song, Hyo-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.5
    • /
    • pp.219-231
    • /
    • 2005
  • Many applications in cluster computing require QoS (Quality of Service) services. Since performance predictability is essential to provide QoS service, underlying systems must provide predictable performance guarantees. One way to ensure such guarantees from network subsystems is to generate global schedules from applications'network requests and to execute the local portion of the schedules at each network interface. To ensure accurate execution of the schedules, it is essential that a global time base must be maintained by local clocks at each network interface. The task of providing a single time base is called a synchronization problem and this paper addresses the problem for system area networks. To solve the synchronization problem, FM-QoS (1) proposed a simple synchronization mechanism called FBS(Feedback-Based Synchronization) which uses built-in How control signals. This paper extends the basic notion of FM-QoS to a theoretical framework and generalizes it: 1) to identify a set of built-in network flow control signals for synchrony and to formalize it as a synchronizing schedule, and 2) to analyze the synchronization precision of FBS in terms of flow control parameters. Based on generalization, two application classes are studied for a single switch network and a multiple switch network. For each class, a synchroniring schedule is proposed and its bounded skew is analyzed. Unlike FM-QoS, the synchronizing schedule is proven to minimize the bounded skew value for a single switch network. To understand the analysis results in practical networks, skew values are obtained with flow control parameters of Myrinet-1280/SAN. We observed that the maximum bounded skew of FBS is 9.2 Usec or less over all our experiments. Based on this result, we came to a conclusion that FBS was a feasible synchronization mechanism in system area networks.

An Enhanced Mechanism of Security Weakness in CDMA Service (CDMA 서비스의 보안취약성과 개선방안)

  • Ryu, Dae-Hyun;Jang, Seung-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.729-742
    • /
    • 2003
  • Mobile Communication has a possibility of eavesdropping by nature of wireless channel. It is known that eavesdropping of CDMA system is impossible because the voice data spreads with the PN. First of all, we show that it is possible to eavesdrop the CDMA channel by analysis of the forward channel in case that we know the ESN and the MIN. We can monitor the forward traffic channel with easy since ESN and MIN are exposed during the call processing in CDMA service in Korea. In this paper, we will show security weakness and propose an enhanced mechanism for CDMA service. We consider the problem of security in the CDMA service. CDMA system has wireless channels to transmit voice or data. By this reason, CDMA communication has a possibility of being eavesdropped by someone. It is known that eavesdropping in CDMA system is impossible because the voice data spreads with the PN. However, we can eavesdrop the CDMA data in FCM protocol in case that we know the ESN and the MIN. In CDMA system, ESN and MIN are exposed to the wireless channel. In this paper, we analyze the flow of the voice and signal in the CDMA system and monitor the forward traffic channel by the FCM protocol. The FCM protocol is proposed to monitor the forward channel in CDMA system. We can show the possibility of monitoring in one-way channel of CDMA system by the FCM protocol. The test instrument based on the FCM protocol is proposed to monitor the CDMA forward channel. We will show the system architecture of the test instrument to monitor the forward channel in CDMA.