• Title/Summary/Keyword: Re-transmission

Search Result 352, Processing Time 0.024 seconds

조류의 다능성 생식세포주 확립 및 분화 특성에 관한 연구

  • 박태섭;한재용
    • Proceedings of the Korea Society of Poultry Science Conference
    • /
    • 2001.11a
    • /
    • pp.40-46
    • /
    • 2001
  • The use of pluripotent stem cells has tremendous advantages for various purposes but these cell lines with proven germ-line transmission have been completely established only in the mouse. Embryonic germ (EG) cell lines are also pluripotent and undifferentiated stem cells established from primordial germ cells (PGCs). This study was conducted to establish and characterize the chicken EG cells derived from gonadal primordial germ cells. We isolated gonadal PGCs from 5.5-day-old (stage 28) White leghorn (WL) embryos and established chicken EG cells lines with EG culture medium supplemented with human stem cell factor (hSCF), murine leukemia inhibitory factor (mLIF), bovine basic fibroblast growth factor (bFGF), human interleukin-11 (hIL-11), and human insulin-like growth factor-I (hIGF-I). These cells grew continuously for 4 months (10 passages) on a feeder layer of mitotically active chicken embryonic fibroblasts. These cells were characterized by screening with the Periodic acid-Shiff's reaction, anti-SSEA-1 antibody, and a proliferation assay after several passages. As the results, the chicken EG cells maintained characteristics of undifferentiated stem cells as well as that of gonadal PGCs. When cultured in suspension, the chicken EG cells successfully formed an embryoid body and differentiated into a variety of cell types when re-seeded onto culture dish. The chicken EG cells were injected into blastodermal layer at stage X and dorsal aorta of recipient embryo at stage 14 (incubation of 53hrs) and produced chimeric chickens with various differentiated tissues derived from the EG cells. The germline chimeras were also successfully induced by using EG cells. Thus, Chicken EG cells will be useful for the production of transgenic chickena and for studies of germ cell differentiation and genomic imprinting.

  • PDF

Detection of vivax malaria sporozoites naturally infected in Anopheline mosquitoes from endemic areas of northern parts of Gyeonggi-do (Province) in Korea

  • Lee, Hyeong-Woo;Shin, E-Hyun;Cho, Shin-Hyeong;Lee, Hee-Il;Kim, Chung-Lim;Lee, Wook-Gyo;Moon, Sung-Ung;Lee, Jong-Soo;Lee, Won-Ja;Kim, Tong-Soo
    • Parasites, Hosts and Diseases
    • /
    • v.40 no.2
    • /
    • pp.75-81
    • /
    • 2002
  • We investigated population densities of mosquitoes infected with sporozoites in three highly epidemic areas of Josan-ri and Jangpa-ri (Paju City) and Dongjung-ri (Yeoncheon County) in Korea. Anopheline mosquitoes were collected front both indoors and outdoors by human baiting collection method during the period of the first week of June to the second week of September 1999. Total 13,296 female mosquitoes were collected and 8,650 (65.1%) were Anophelines. Thirty seven percent (3,199) of the Anopheline mosquitoes were captured outdoors and 63.9% (5,531) indoors. Employing a sandwich enzyme-linked immunosorbent assay (ELISA), we analyzed a total of 7,820 Anopheline mosquitoes and found that 7 Anopheline mosquitoes were infected with sporozoites. The positive rate in Josan-ri was 0.14% (5/3,500) and 0.15% (2/1,370) in Jangpa-ri. The total positive rate in all three surveyed areas was 0.09% (7/7,820). The mosquitoes infected with the sporozoites were detected on June $28^{th}$ (n=2), July $5^{th}$ (n=1), July $19^{th}$ (n=1), August $9^{th}$ (n=1), September $6^{th}$ (n=1), and the last one on September $13^{th}$ (n=1). They were all classified as Anopheles sinensis, which showed positive reaction in ELISA test. Therefore it might be concluded that Anopheles sinensis plays an important role in re-emerging malaria transmission in Korea.

A Handover Method Based On the Position Information of a Mobile Terminal (이동 단말기의 위치 정보에 기반한 핸드오버 방법)

  • Lee Jong-Chan;Lee Moon-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.4A
    • /
    • pp.385-392
    • /
    • 2006
  • It is widely accepted that high user densities in mobile multimedia environments can only be achieved with micro- and pico-cell. The smaller cell size causes frequent handovers between cells, and decreases permissible handover processing delay. This may result in the handover failure, in addition to the loss of some packets during the handover. In these cases, re-transmission is needed in order to compensate errors, which in turn triggers a rapid degradation of throughput. In this paper, we propose a new handover scheme for the next generation mobile communication systems, in which the handover setup process is done in advance before a handover request by predicting the handover cell based on mobile terminal's current position and moving direction. Simulation is performed in order to analyze the handover failure rate and packet loss rate. Simulation results show that our proposed method provides a better performance than the conventional method.

Effect of Drying Methods on the Production of Graphenes Oxide Powder Prepared by Chemical Exfoliation (화학적 박리법으로 제조된 산화그래핀 분말의 건조방법에 따른 물성 비교)

  • Rho, Sangkyun;Noh, Kyung-Hun;Eom, Sung-Hun;Hur, Seung Hyun;Lim, Hyung Mi
    • Korean Journal of Materials Research
    • /
    • v.23 no.10
    • /
    • pp.592-598
    • /
    • 2013
  • Graphene oxide powders prepared by two different drying processes, freeze drying and spray drying, were studied to compare the effect of the drying method on the physical properties of graphene oxide powder. The graphene oxide dispersion was prepared from graphite by chemical delamination with the aid of sulfuric acid and permanganic acid, and the dispersion was further washed and re-dispersed in a mixed solvent of water and isopropyl alcohol. A freeze drying method can feasibly minimize damage to the sample, but it requires a long process time. In contrast, spray drying is able to remove a solvent in a relatively short time, though this process requires exposure to a high temperature for a rapid evaporation of the solvent. The powders prepared by freeze drying and spray drying were characterized and compared by Raman spectroscopy, X-ray diffraction, field-emission scanning electron microscopy, transmission electron microscopy, and by an elemental analysis. The graphene oxide powders showed similar chemical compositions; however, the morphologies of the powders differed in that the graphene oxide prepared by spray drying had a winkled morphology and a higher apparent density compared to the powder prepared by freeze drying. The graphene oxide powders were reduced at $900^{\circ}C$ in an atmosphere of $N_2$. The effect of the drying process on the properties of the reduced graphene oxide was examined by SEM, TEM and Raman spectroscopy.

Performance Analysis of Sensor Systems for Space Situational Awareness

  • Choi, Eun-Jung;Cho, Sungki;Jo, Jung Hyun;Park, Jang-Hyun;Chung, Taejin;Park, Jaewoo;Jeon, Hocheol;Yun, Ami;Lee, Yonghui
    • Journal of Astronomy and Space Sciences
    • /
    • v.34 no.4
    • /
    • pp.303-314
    • /
    • 2017
  • With increased human activity in space, the risk of re-entry and collision between space objects is constantly increasing. Hence, the need for space situational awareness (SSA) programs has been acknowledged by many experienced space agencies. Optical and radar sensors, which enable the surveillance and tracking of space objects, are the most important technical components of SSA systems. In particular, combinations of radar systems and optical sensor networks play an outstanding role in SSA programs. At present, Korea operates the optical wide field patrol network (OWL-Net), the only optical system for tracking space objects. However, due to their dependence on weather conditions and observation time, it is not reasonable to use optical systems alone for SSA initiatives, as they have limited operational availability. Therefore, the strategies for developing radar systems should be considered for an efficient SSA system using currently available technology. The purpose of this paper is to analyze the performance of a radar system in detecting and tracking space objects. With the radar system investigated, the minimum sensitivity is defined as detection of a $1-m^2$ radar cross section (RCS) at an altitude of 2,000 km, with operating frequencies in the L, S, C, X or Ku-band. The results of power budget analysis showed that the maximum detection range of 2,000 km, which includes the low earth orbit (LEO) environment, can be achieved with a transmission power of 900 kW, transmit and receive antenna gains of 40 dB and 43 dB, respectively, a pulse width of 2 ms, and a signal processing gain of 13.3 dB, at a frequency of 1.3 GHz. We defined the key parameters of the radar following a performance analysis of the system. This research can thus provide guidelines for the conceptual design of radar systems for national SSA initiatives.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Limited Reception Function based Two-Way Authentication T-DMB System (제한수신 기능을 통한 양방향 인증 T-DMB 시스템)

  • Lee, Jong-Won;Park, Sang-No;Yu, Dae-Sang;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.794-796
    • /
    • 2016
  • Recently terrestrial mobile multimedia broadcasting(T-DMB) service is being provided throughout the country are expanding and demand is increasing day by day. T-DMB has the advantage of being cheaper in cost than installing another mobile multimedia broadcasting. However, there are a variety data of additional and provide it difficult for localized emergency alert broadcasting services. In this paper, a method to solve this problem feature was designed to restrict incoming unidirectional / bidirectional authentication via T-DMB system. In the mobile device is received by the T-DMB broadcasting service authentication mechanism for re-transmission to the mobile device, and T-DMB receiving other registered users can view it impossible to receive the broadcast. Through the proposed system it is considered to be able to solve the problems of the existing T-DMB technology.

  • PDF

A Research on Quality Improvement of Software-based Video Teleconferencing on the Tactical Communication Networks Less Than 1Mbps (1Mbps 이하 전술통신망에서의 소프트웨어 방식 화상회의 품질향상 연구)

  • Kim, Gwon-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.63-75
    • /
    • 2012
  • This paper researched the operation methods of software video teleconferencing on the tactical communication networks under 1Mbps. The tactical communication networks have limited bandwidths, frequent data losses and transmission delays due to the unstable networks. In addition, the bandwidth for video teleconferencing has to be much smaller since the Army Tactical Command Information System(ATCIS) has priority of using the bandwidth. This paper analyzed such restrictions of tactical communication networks, presented some methods to improve the quality of the software video teleconferencing on the tactical communication networks and their actual experiments as well. It is applied in the first place to re-transmit the lost packets and to reduce the image size for the data traffic. Nothing is better for the video teleconferencing than to provide the bandwidth enough for every user. However, on the tactical communication networks with the limited bandwidth, video teleconferencing can be improved by optimizing the compression rate of image data, the number of image frames, the audio codec and the usage of audio compensation data.

Fault Tolerant Data Aggregation for Reliable Data Gathering in Wireless Sensor Networks (무선센서네트워크에서 신뢰성있는 데이터수집을 위한 고장감내형 데이터 병합 기법)

  • Baek, Jang-Woon;Nam, Young-Jin;Jung, Seung-Wan;Seo, Dae-Wha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1295-1304
    • /
    • 2010
  • This paper proposes a fault-tolerant data aggregation which provides energy efficient and reliable data collection in wireless sensor networks. The traditional aggregation scheme does not provide the countermeasure to packet loss or the countermeasure scheme requires a large amount of energy. The proposed scheme applies caching and re-transmission based on the track topology to the adaptive timeout scheduling. The proposed scheme uses a single-path routing based on the traditional tree topology at normal, which reduces the dissipated energy in sensor nodes without any countermeasure against packet loss. The proposed scheme, however, retransmits the lost packet using track topology under event occurrences in order to fulfill more accurate data aggregation. Extensive simulation work under various workloads has revealed that the proposed scheme decrease by 8% in terms of the dissipated energy and enhances data accuracy 41% when the potential of event occurrence exists as compared with TAG data aggregation. And the proposed scheme decrease by 53% in terms of the dissipated energy and shows a similar performance in data accuracy when the potential of event occurrence exists as compared with PERLA data aggregation.

Shared Relay-Based Interference Management Schemes for Device-to-Device Radio Underlaying Cellular Networks (셀룰러 네트워크상의 D2D 통신을 위한 공유릴레이 기반 간섭 관리 기법)

  • Yang, Mochan;Wu, Shanai;Shin, Oh-Soon;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.4
    • /
    • pp.371-380
    • /
    • 2013
  • D2D (Device-to-Device) communication on an underlying cellular infrastructure which exploits the same spectrum has several advantages such as increased resource utilization and improved cellular coverage. However, D2D communication system needs to cope with ICI (Inter-Cell Interference) and interference between cellular and D2D links. As a result, macro UEs (User Equipments), especially those located near cell edge, will suffer from serious link performance degradation. We propose a novel interference avoidance mechanism assisted by SRN (Shared Relay Node) in this paper. SRN not only performs data re-transmission as a usual Type II relay but also has several features newly defined to avoid interference between cellular and D2D links. In particular, we suggest resource allocation methods based on the SRN for effective interference avoidance, and evaluate their performance through computer simulations.