• Title/Summary/Keyword: T24

Search Result 7,693, Processing Time 0.032 seconds

Design and Implementation of Add/Drop control chip using AT&T ORCA FPGA (AT&T ORCA FPGA를 이용한 Add/DroP Control Chip의 설계)

  • Lee, Sang-Hoon;Sung, Yung-Kwon
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.1286-1288
    • /
    • 1996
  • An add/drop control chip for SDH transmission system has been designed in AT&T 0.5um CMOS ORCA FPGA. This device plays an important role in achieving self-healing ring operation which protects against failure. After this device receives each 24-ch AU-3 signals from the west, east, and add parts, it outputs each 24-ch switched signals through the control data of system control port. This device consists of eight sub-part such west/east transmitting part, west/east receiving part, add/drop control part, AIS control part, and CPU interface part. The designed device is capable to ring networks as well as linear networks.

  • PDF

MAGNETIC PROPERTIES OF $FePt_{3}$ ORDERED ALLOY

  • Yoshida, H.;Fujimori, H.;Kaneko, T.;Abe, S.;Watanabe, K.;Matsumoto, M.;Yoshida, T.;Kanomata, T.
    • Journal of the Korean Magnetics Society
    • /
    • v.5 no.5
    • /
    • pp.362-365
    • /
    • 1995
  • The magnetic properties for $Fe_{24}Pt_{76}\;and\;Fe_{26}Pt_{74}$ have been investigated. The temperature vs. magnetic susceptibility curve for $Fe_{24}Pt_{76}$ had no peak near the Neel temperature. The magnetization proccess at 4.2 K showed only a linear variation up to the high magnetic field of 240 kOe. That for $Fe_{26}Pt_{74}$ at 77 K showed a metamagnetic transition at 100 kOe. These properties were discussed on the basis of a band picture.

  • PDF

SOME EXAMPLES OF ALMOST GCD-DOMAINS

  • Chang, Gyu Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.24 no.3
    • /
    • pp.601-607
    • /
    • 2011
  • Let D be an integral domain, X be an indeterminate over D, and D[X] be the polynomial ring over D. We show that D is an almost weakly factorial PvMD if and only if D + XDS[X] is an integrally closed almost GCD-domain for each (saturated) multiplicative subset S of D, if and only if $D+XD_1[X]$ is an integrally closed almost GCD-domain for any t-linked overring $D_1$ of D, if and only if $D_1+XD_2[X]$ is an integrally closed almost GCD-domain for all t-linked overrings $D_1{\subseteq}D_2$ of D.

Performance Evaluation of Low Power Communication Techniques Coverage for Internet of Things (IoT를 위한 저전력 통신 기술의 성능 평가)

  • Yoon, JeongHyeon;Kim, Seungku
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.9
    • /
    • pp.1211-1223
    • /
    • 2021
  • Internet of Things(IoT) services have increased the demand for connectivity among electronics devices. As a result, various types of novel wireless communication technologies have been standardized and developed. In this paper, we evaluate the performance of low power wireless communication technologies such as Bluetooth, IEEE 802.15.4, DASH 7, IEEE 802.15.4g, LoRa, and SigFox in various environments. This is the first experiment evaluating various low power wireless communication technologies in real testbed. We expect that the evaluation results will be useful data to other researchers in applying the IoT technology in the future.

Ultra-light Mutual Authentication Scheme based on Text Steganography Communication

  • Lee, Wan Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.11-18
    • /
    • 2019
  • Previous mutual authentication schemes operate on the basis of validated cryptographic functions and hash functions, but these functions require a certain amount of memory capacity. However, since ultra-lightweight IoT devices have a very small amount of memory capacity, these functions can not be applied. In this paper, we first propose a text steganography communication scheme suitable for ultra-lightweight IoT devices with limited resources, and then propose a mutual authentication scheme based on the text steganography communication. The proposed scheme performs mutual authentication and integrity verification using very small amount of memory. For evaluation, we implemented the proposed scheme on Arduino boards and confirmed that the proposed scheme performs well the mutual authentication and the integrity verification functions.

Adult-onset Leigh syndrome due to m.9176T>C mutation with cortical involvement

  • Lee, Hyuk-je;Lee, Myungah;Lee, Jung Hwan
    • Annals of Clinical Neurophysiology
    • /
    • v.24 no.2
    • /
    • pp.107-110
    • /
    • 2022
  • We describe the case of a 22-year-old female complaining of ophthalmoplegia, which deteriorated with seizure. Leigh syndrome (LS) was diagnosed by identifying the m.9176T>C mutation. She improved with vitamin cocktail therapy plus intravenous methylprednisolone, and had an excellent prognosis. This was the first case of an adult patient with LS presenting with the m.9176T>C mutation and reporting cortical symptoms, which in this case comprised cortical vision loss, and cortical, basal ganglia, and brainstem signal changes on magnetic resonance imaging.

A DDoS attack Mitigation in IoT Communications Using Machine Learning

  • Hailye Tekleselase
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.170-178
    • /
    • 2024
  • Through the growth of the fifth-generation networks and artificial intelligence technologies, new threats and challenges have appeared to wireless communication system, especially in cybersecurity. And IoT networks are gradually attractive stages for introduction of DDoS attacks due to integral frailer security and resource-constrained nature of IoT devices. This paper emphases on detecting DDoS attack in wireless networks by categorizing inward network packets on the transport layer as either "abnormal" or "normal" using the integration of machine learning algorithms knowledge-based system. In this paper, deep learning algorithms and CNN were autonomously trained for mitigating DDoS attacks. This paper lays importance on misuse based DDOS attacks which comprise TCP SYN-Flood and ICMP flood. The researcher uses CICIDS2017 and NSL-KDD dataset in training and testing the algorithms (model) while the experimentation phase. accuracy score is used to measure the classification performance of the four algorithms. the results display that the 99.93 performance is recorded.

Cytokines in Follicular Helper T Cell Biology in Physiologic and Pathologic Conditions

  • Jinyong Choi;Shane Crotty;Youn Soo Choi
    • IMMUNE NETWORK
    • /
    • v.24 no.1
    • /
    • pp.8.1-8.17
    • /
    • 2024
  • Follicular helper T cells (Tfh) play a crucial role in generating high-affinity antibodies (Abs) and establishing immunological memory. Cytokines, among other functional molecules produced by Tfh, are central to germinal center (GC) reactions. This review focuses on the role of cytokines, including IL-21 and IL-4, in regulating B cell responses within the GC, such as differentiation, affinity maturation, and plasma cell development. Additionally, this review explores the impact of other cytokines like CXCL13, IL-10, IL-9, and IL-2 on GC responses and their potential involvement in autoimmune diseases, allergies, and cancer. This review highlights contributions of Tfh-derived cytokines to both protective immunity and immunopathology across a spectrum of diseases. A deeper understanding of Tfh cytokine biology holds promise for insights into biomedical conditions.

The Formation of Trans Fatty Acids with Heat Treatment and Storage of Fats and Oils (II) -The contents and the kinds of Trans fatty acids- (유지의 가열 및 저장에 따른 Trans지방산 생성에 관한 연구 -제2보 ; Trans지방산 함량 및 조성 변화를 중심으로-)

  • Kim, Duk-Sook;Koo, Bon-Soon;Ahn, Myung-Soo
    • Korean journal of food and cookery science
    • /
    • v.6 no.3 s.12
    • /
    • pp.25-32
    • /
    • 1990
  • In this study, the cis to trans isomerization of unsaturated fatty acids were investigated about Soybean oil (SBO), Corn germ oil (CGO), Cottonseed oil (CSO), Margarine (MG), Shortening (ST) incubated at $40{\pm}2^{\circ}C$ for 35 days and heated at $185{\pm}2^{\circ}C$ for 24 hours. The contents and kinds of trans fatty acids in each sample were determined by GLC after seperating by HPLC. The results were obtained as follows; 1. When samples were incubated at $40{\pm}2^{\circ}C$ for 35 days, the contents of total trans fatty acids were increased from $0.5{\sim}12.3%$ to $0.8{\sim}20.5%$. The kinds of trans fatty acids found were $t-C_{18:1},\;t,c-C_{18:2},\;t,t-C_{18:2},\;t,c,c-C_{18:3}$ in $SBO,\;t-C_{18:1},\;t,c-C_{18:2}$ in $CGO,\;t-C_{16:1},\;t-C_{18:1},\;t,c-C_{18:2},\;t,t-C_{18:2}$ in CSO. Processed oil such as MG and ST showed more complicated composition of trans fatty acids than SBO, CGO and CSO. $t-C_{18:1},\;t,c-C_{18:2},\;t,t-C_{18:2},\;t,c,t-C_{18:3},\;t-C_{20:1}$ were detected in ST. 2. In the case of heating at $185{\pm}2^{\circ}C$ for 24 hours, the contents of total trans fatty acid were $1.6{\sim}37%$. 2% in all samples. Heating made more remarkable isomerization than incubation $(40{\pm}2^{\circ}C)$. Specially, $c,c,t-C_{18:3}$ in $SBO,\;t,t,t-C_{18:3}$ in $MG,\;t,c,t-C_{18:3},\;t,t,t-C_{18:3}$ in ST were detected. 3. The total contents of trans fatty acids of processed oil were higher than vegetable oils. During incubation, trans fatty acids increased in the order of MG>ST>CGO>SBO>CSO, and during heat treatment, MG>ST>SBO>CGO>CSO.

  • PDF

Design Formula for the Flexural Strength of a Double Split Tee Connection (상·하부 스플릿 T 접합부의 휨강도 설계식)

  • Yang, Jae-Gue;Kim, Joo-Wo;Kim, Yu
    • Journal of Korean Society of Steel Construction
    • /
    • v.24 no.5
    • /
    • pp.511-520
    • /
    • 2012
  • The double split Tee connection, a type of full strength-partially restrained connection, has adequate flexural strength according to the changes in the thickness of the T-stub flange and the gauge distance of the high-strength bolts. Moreover, the double split Tee connection is designed and constructed with seismic connections that have enough ductility capacity applicable to ordinary moment frame and special moment frame by grade of steel, size of beam and column and geometric connection shape. However, such a domestic research and a proposal of a suitable design formula about the double split Tee connection are insufficient. Thus, many experimental and analytical studies are in need for the domestic application of the double split Tee connection. Therefore, this study aimed to examine and suggest feasibility of a design formula of the double split Tee connection of FEMA.