• Title/Summary/Keyword: blocking model

Search Result 412, Processing Time 0.022 seconds

Performance analysis of the Resource Reservation Schemes using Mobile Cluster based H-MRSVP in Wireless Mobile Networks (무선 이동망에서 이동 클러스터 기반의 H-MRVP를 이용한 자원관리 기법의 성능 분석)

  • Ma, Gyeong-Min;Won, Jeong-Jae;Lee, Hyeong-U;Jo, Chung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.283-292
    • /
    • 2002
  • This paper develops a scheme of resource management for guaranteeing QoS of realtime traffic in wireless mobile internet environments Mobile terminal has significant impact on the QoS originating mobility provided to a real-time application. The currently proposed MRSVP is not clear the boundary of resource reservation tregion and also can give rise to signal overhead to maintain sessions. To solve above problem, we propose the new reservation protocol, mobile cluster based H-MRSVP to combine MRSVP with moving cluster concept. In this paper, we analytically design our model for guaranteeing the QoS of realtime traffic and compare the three schemes: guard channel allocation schemes, DCA and our model. The performance measures are the probabilities of new call blocking, handoff dropping, resource utilization and service completion versus the system offered Erlang load. Consequently, Simulation indicate our model is more flexible than DCA in a view pint of channel utilization and gains the advantage over guard channel scheme with respects to the mobility.

Performance Improvement of Computing Time of 2 Dimensional Finite Volume Model using MPI (MPI를 이용한 2차원 유한체적모형의 계산 성능 개선)

  • Kim, Tae Hyung;Han, Kun Yeun;Kim, Byung Hyun
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.7
    • /
    • pp.599-614
    • /
    • 2014
  • In this study, two dimensional finite volume model was parallelized to improve computing time, which has been developed to be able to apply for the mixed meshes of triangle and quadrilateral. MPI scheme which is free from limitation of the number of cores was applied, and non-blocking point-to-point communication was used for fluxes and time steps calculation domain. The developed model is applied to analyze dam break in a L-shaped experimental channel with $90^{\circ}$ bend and Malpasset dam breach event to calibrate the consistency between parallelized model and existing model and examine the speed-up and efficiency of computing time. Computational speed-up about the size of the input data was considered by simulating 4 cases classified by the number of meshes, Consequently, the simulation results reached a satisfactory accuracy compared to measured data and the results from existing model, and achieved more than 3 times benefit of computational speed-up against computing time of existing model. Simulation results of 3 cases classified by the size of input data lead us to the conclusion that it is important to use proper size of input data and the number of process in order to minimize the communication overhead.

A Data Burst Assembly Algorithm in Optical Burst Switching Networks

  • Oh, Se-Yoon;Hong, Hyun-Ha;Kang, Min-Ho
    • ETRI Journal
    • /
    • v.24 no.4
    • /
    • pp.311-322
    • /
    • 2002
  • Presently, optical burst switching (OBS) technology is under study as a promising solution for the backbone of the optical Internet in the near future because OBS eliminates the optical buffer problem at the switching node with the help of no optical/electro/optical conversion and guarantees class of service without any buffering. To implement the OBS network, there are a lot of challenging issues to be solved. The edge router, burst offset time management, and burst assembly mechanism are critical issues. In addition, the core router needs data burst and control header packet scheduling, a protection and restoration mechanism, and a contention resolution scheme. In this paper, we focus on the burst assembly mechanism. We present a novel data burst generation algorithm that uses hysteresis characteristics in the queueing model for the ingress edge node in optical burst switching networks. Simulation with Poisson and self-similar traffic models shows that this algorithm adaptively changes the data burst size according to the offered load and offers high average data burst utilization with a lower timer operation. It also reduces the possibility of a continuous blocking problem in the bandwidth reservation request, limits the maximum queueing delay, and minimizes the required burst size by lifting up data burst utilization for bursty input IP traffic.

  • PDF

Development of a Synthetic Multi-Agent System;The KMITL Cadence 2003 Robotic Soccer Simulation Team, Intelligent and AI Based Control

  • Chitipalungsri, Thunyawat;Jirawatsiwaporn, Chawit;Tangchupong, Thanapon;Kittitornkun, Surin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.879-884
    • /
    • 2004
  • This paper describes the development of a synthetic multi-agent called KMITL Cadence 2003. KMITL Cadence 2003 is a robotic soccer simulation team consisting of eleven autonomous software agents. Each agent operates in a physical soccer simulation model called Robocup Soccer Server which provides fully distributed and real-time multi-agent system environment. All teammates have to cooperate to achieve the common goal of winning the game. The simulation models many aspects of the football field such as noise in ball movements, noisy sensors, unreliable communication channel between teammates and actuators, limited physical abilities and restricted communication. This paper addresses the algorithm to develop the soccer agents to perform basic actions which are scoring, passing ball and blocking the opponents effectively. The result of this development is satisfactory because the successful scoring attempts is increased from 11.1% to 33.3%, successful passing ball attempts is increased from 22.08% to 63.64%, and also, successful intercepting attempts is increased from 88% to 97.73%.

  • PDF

Alternative Mechanism of Aspirin in Anti-Thrombotic Therapy: Inhibition of Thrombin Activatable Fibrinolysis Inhibitor

  • An, Seong-Soo A.;Greenfield, Robert S.
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.9
    • /
    • pp.3048-3054
    • /
    • 2012
  • The use of aspirin is widely recommended for the prevention of heart attacks owing to its ability to inhibit platelet activation by irreversibly blocking cyclooxygenase 1. However, aspirin also affects the fibrinolytic and hemostatic pathways by mechanisms that are not well understood, causing severe hemorrhagic complications. Here, we investigated the ability of aspirin and aspirin metabolites to inhibit thrombin-activatable fibrinolysis inhibitor (TAFI), the major inhibitor of plasma fibrinolysis. TAFI is activated via proteolytic cleavage by the thrombin-thrombomodulin complex to TAFIa, a carboxypeptidase B-like enzyme. TAFIa modulates fibrinolysis by removing the C-terminal arginine and lysine residues from partially degraded fibrin, which in turn inhibits the binding of plasminogen to fibrin clots. Aspirin and its major metabolites, salicylic acid, gentisic acid, and salicyluric acid, inhibit TAFIa carboxypeptidase activity. Salicyluric acid effectively blocks activation of TAFI by thrombin-thrombomodulin; however, salicylates do not inhibit carboxypeptidase N or pancreatic carboxypeptidase B. Aspirin and other salicylates accelerated the dissolution of fibrin clots and reduced thrombus formation in an in vitro model of fibrinolysis. Inhibition of TAFI represents a novel hemostatic mechanism that contributes to aspirin's therapy-associated antithrombotic activity and hemorrhagic complications.

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

EMICS: E-mail based Malware Infected IP Collection System

  • Lee, Taejin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.6
    • /
    • pp.2881-2894
    • /
    • 2018
  • Cyber attacks are increasing continuously. On average about one million malicious codes appear every day, and attacks are expanding gradually to IT convergence services (e.g. vehicles and television) and social infrastructure (nuclear energy, power, water, etc.), as well as cyberspace. Analysis of large-scale cyber incidents has revealed that most attacks are started by PCs infected with malicious code. This paper proposes a method of detecting an attack IP automatically by analyzing the characteristics of the e-mail transfer path, which cannot be manipulated by the attacker. In particular, we developed a system based on the proposed model, and operated it for more than four months, and then detected 1,750,000 attack IPs by analyzing 22,570,000 spam e-mails in a commercial environment. A detected attack IP can be used to remove spam e-mails by linking it with the cyber removal system, or to block spam e-mails by linking it with the RBL(Real-time Blocking List) system. In addition, the developed system is expected to play a positive role in preventing cyber attacks, as it can detect a large number of attack IPs when linked with the portal site.

CoMFA and CoMSIA on the Inhibition of Calcineurin-NFAT Signaling by Blocking Protein-Protein Interaction with N-(4-Oxo-1(4H)-naphthalenylidene)benzenesulfonamide Derivatives

  • Myung, Pyung-Keun;Park, Kyung-Yong;Sung, Nack-Do
    • Bulletin of the Korean Chemical Society
    • /
    • v.26 no.12
    • /
    • pp.1941-1945
    • /
    • 2005
  • To raises the possibility of designing effective inhibitors, 3D-QSAR for the inhibition of calcineurin-NFAT signaling by new N-(4-oxo-1(4H)-naphthalenylidene benzenesulfonamide derivatives as inhibitors of intracellular protein-protein interactions were studied using CoMFA and CoMSIA methodology. The three templates, N-(4-oxo-1(4H)-naphthalenylidene)benzenesulfonamide (A), benzenesulfonamide (B) and 4-oxo-1(4H)-naphthalenylidene (C) were selected to improve the statistic of the present 3D-QSAR models. The best models with combination of standard field in CoMFA, and steric field and electrostatic field in CoMSIA derived from the template, B and C, because most of the compounds tend not to be aligned in template A. From the based on the CoMFA and CoMSIA contour maps, the $R_1$ and $R_2$ groups on 4-oxo-1(4H) naphthalenylidene ring are steric favor. The ortho position on the benzenesulfonyl ring is steric disfavor and the meta position is steric favor. In addition, the oxygene atom of carbonyl group will have better inhibition activities as it has a negative charge favor. From these findings, we can conclude that the analyses of the contour maps provided insight into possible modification of molecules for effective inhibitiors.

Uncaria sinensis(OIi.) Havil Suppressendotoxin-induced Proinflammatory Responses through Blocking ERK Signaling Pathways

  • Park, Tai-Guang;Moon, Hyung-Cheal;Cho, Hae-Joong;Seo, Sang-Wan;Jung, Won-Sek;Song, Ho-Joon;Park, Sung-Joo
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.21 no.5
    • /
    • pp.1297-1302
    • /
    • 2007
  • Uncaria sinensis(OIi.) Havil (USH) is used in traditional Korean medicine to treat inflammation such as amebic dysentery. In this study, we investigated the anti-inflammatory effect of USH. The water extract of USH significantly inhibits lipopolysaccharide (LPS)-induced nitrite oxide (NO), tumor necrosis factor $(TNF)-{\alpha}$, interleukin (IL)-6and IL-12 productions in murine peritoneal macrophages. Furthermore, USH selectively inhibited activation of the extracellular signal-regulated kinase (ERK) but not of p38 MAPK, c-Jun N-terminal kinase (JNK) and nuclear $factor-{\kappa}B$ $(NF-{\kappa}B)$. In murine model, we found that administration of USH reduced serum levels of $TNF-{\alpha}$, IL-6 and IL-12 productions in LPS-treated mice. Our results suggest that USH exerts ant-inflammatory effects in macrophages via inhibition of ERK activation and may be a useful therapeutic approach to inflammatory diseases.

Efficient Batch Rekeying Scheme using Random Number (난수를 사용한 효율적인 일괄 rekeying 기법)

  • Chung, Joung-In
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.891-902
    • /
    • 2004
  • Membership changing is deeply associated with scalability problem for group key management. If members of the group join or leave, new group key has to be geneerated and distributed to all remaining members of group. Group key changing is perform for group controller. The following parameters are important evaluating criteria of multicast key management scheme that generate and deliver new keys for rekeying: the number of keys stored by both controller and member, messages to deliver, keys to initially be delivered by controller, blocking capability of collusion attacks, messages to deliver at the batch rekeyng. Batch rekeying can reduce messages to deliver and operation costs of generation for message rather than removing members sequentially in fashion one after another. We propose efficient batch rekeying scheme applicable to Pegueroles scheme using random number and prove to be a efficient group key scheme for enhanced Pegueroles model with batch rekeying capability.

  • PDF