• Title/Summary/Keyword: checkpoint

Search Result 246, Processing Time 0.033 seconds

A Study on Quality Assurance(QA) Guideline for Diagnostic Monitor (판독용 모니터 정도관리 항목 및 시행기준안 개발 연구)

  • Son, Gi-Gyeong;Sung, Dong-Wook;Jung, Hae-Jo;Jeong, Jae-Ho;Kang, Hee-Doo;Shin, Jin-Ho;Lee, Sun-Geun;Kim, Yong-Hwan
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.9 no.1
    • /
    • pp.53-65
    • /
    • 2007
  • PACS has been run at the Kyung Hee University Medical Center(KHMC) since 2001, and the installation and operation of PACS have contributed to automation and quantification of KHMC's medical environment During these five years our greatest concern is how to make our own guiding principle of diagnostic monitor QA which is adapted to international standards. In accordance with the terms of 'KHMC QA Guideline', 'AAPM TG18', 'SMPTE RP133', 'DICOM Part14', 'DIN V 6868-57', 'JESRA X-0093', 'JIS Z4752-2-5' and 'KCARE', concern about quality assurance of medical images are on the increase. With the investigation of acceptance testing and quality control of international standards for medical display devices, and data collection and analysis for recommended guideline, it is reported that acceptance testing(quality control), including geometrical distortion, display reflection, luminance response, luminance uniformity, display resolution, display noise, veiling glare and color chromaticity being adequate and effective to domestic hospital environments for medical display devices and assessment methods according to each performance. Accordingly, KHMC classified the checkpoint items by period, at the time of monitor setting, monthly, quarterly, half-yearly and annually. Periodic classification of checkpoint items for monitor QA makes a good guideline for image QA/QC and useful guideline for persistent good quality of monitor.

  • PDF

Stable Recovery Strategy According to Mobility of Mobile Host (모바일 호스트의 이동성에 따른 안정적인 복구 기법)

  • Choi Ca-Hyun;Hwang Byung-Yeon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.953-960
    • /
    • 2005
  • The Network can be easily damaged in the mobile computing environment. Mobile Support Station (MSS) which supports the Mobile Host(MH) could also be unstable too. Therefore, when a critical error occurs the repairing cost can be high. For stable repair, the hand-off strategy should be considered to save the continuing message and checkpoint information, and to reduce the cost of network repair. In this paper, we propose the Switching Trickle(ST) strategy which reduces the repairing cost for the MH's mobility. ST strategy changes the way which stores the information in connection with the number of write events(r) that occur from the hands-off strategy. Accumulated cost by increased mobility has been simulated too. From the results of simulation, the proposed strategy has shown more cost effective than the conventional strategy. The proposed strategy also has shown very supportive in saving checkpoint and message log information stably.

  • PDF

Coiled-Coil Domain-Containing Protein 98 (CCDC98) Regulates Cyclin B1 Expression by Affecting WTAP Protein Stability (WTAP 단백질의 안정성을 통한 CCDC98 단백질의 cyclin B1 발현 조절)

  • Oh, Yun-Jung;Lee, Eun-Hee;Lee, Il-Kyu;Kim, Kyung-Soo;Kim, Hong-Tae
    • Journal of Life Science
    • /
    • v.21 no.8
    • /
    • pp.1067-1075
    • /
    • 2011
  • Coiled-coil domain-containing protein 98 (CCDC98) plays a role in G2/M DNA damage checkpoint pathways by recruiting breast cancer 1 (BRCA1)-A complex to the DNA-damaged sites. However, the molecular mechanism of CCDC98 on the DNA damage-induced G2/M checkpoint pathways is unclear. In this study, we identifed Wilms tumor 1-associating protein (WTAP) as a novel CCDC98-binding protein, using tandem affinity purification. We confirmed the association between CCDC98 and WTAP using in vivo and in vitro binding assays. We demonstrated that CCDC98 regulates cyclin B1 expression by affecting WTAP protein stability. Based on these results, we suggest that CCDC98 may act as a novel cell cycle regulator by regulating the expression level of cyclin B1.

Knock-down of human MutY homolog (hMYH) decreases phosphorylation of checkpoint kinase 1 (Chk1) induced by hydroxyurea and UV treatment

  • Hahm, Soo-Hyun;Park, Jong-Hwa;Ko, Sung-Il;Lee, You-Ri;Chung, In-Sik;Chung, Ji-Hyung;Kang, Lin-Woo;Han, Ye-Sun
    • BMB Reports
    • /
    • v.44 no.5
    • /
    • pp.352-357
    • /
    • 2011
  • The effect of human MutY homolog (hMYH) on the activation of checkpoint proteins in response to hydroxyurea (HU) and ultraviolet (UV) treatment was investigated in hMYH-disrupted HEK293 cells. hMYH-disrupted cells decreased the phosphorylation of Chk1 upon HU or UV treatment and increased the phosphorylation of Cdk2 and the amount of Cdc25A, but not Cdc25C. In siMYH-transfected cells, the increased rate of phosphorylated Chk1 upon HU or UV treatment was lower than that in siGFP-transfected cells, meaning that hMYH was involved in the activation mechanism of Chk1 upon DNA damage. The phosphorylation of ataxia telangiectasia and Rad3-related protein (ATR) upon HU or UV treatment was decreased in hMYH-disrupted HEK293 and HaCaT cells. Co-immunoprecipitation experiments showed that hMYH was immunoprecipitated by anti-ATR. These results suggest that hMYH may interact with ATR and function as a mediator of Chk1 phosphorylation in response to DNA damage.

Effect of DPBll Gene for the Transcriptional Induction by DNA Damage During Cell Cycle in Saccharomyces cerevisiae (출아효모의 세포주기동안 DNA 상해에 의한 발현 유도에 미치는 DPB11 유전자의 영향)

  • 선우양일;임선희;배호정;김중현;김은아;김승일;김수현;박정은;김재우
    • Korean Journal of Microbiology
    • /
    • v.38 no.2
    • /
    • pp.96-102
    • /
    • 2002
  • The S-phase checkpoint mechanisms response to DNA damage or inhibition of DNA replication for maintenance of genetic stability in eukaryotic cells. These roles include cell cycle control arrest at S-phase and Iranscriptional induction of repair genes. To characterize the defects of dpbll mutant for both these responses, we examined the over-expression effect of DPBll gene, the sensitivity to HU, MMS, and the transcriptional pattern by DNA damage agent for RNRS mRNA. RNRS transcript is induced in response to a wide variety of agents that either damage D7A directly through chemical modification or induce stress by blocking DNA synthesis. As results, dpbll-1 cells are sensitive to DNA damage agents and the level of RNR3 mRNA is reduced approximately 40% than wild type cells. Moreover, we found the same results in dpb2-1 cells. Therefore, we propose that DPB2 and DPBll act as a sensor of replication that coordinates the transcriptional and cell cycle responses to replication blocks.

New Z-Cycle Detection Algorithm Using Communication Pattern Transformation for the Minimum Number of Forced Checkpoints (통신 유형 변형을 이용하여 검사점 생성 개수를 개선한 검사점 Z-Cycle 검출 기법)

  • Woo Namyoon;Yeom Heon Young;Park Taesoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.12
    • /
    • pp.692-703
    • /
    • 2004
  • Communication induced checkpointing (CIC) is one of the checkpointing techniques to provide fault tolerance for distributed systems. Independent checkpoints that each distributed process produces without coordination are likely to be useless. Useless checkpoints, which cannot belong to any consistent global checkpoint sets, induce nondeterminant rollback. To prevent the useless checkpoints, CIC forces processes to take additional checkpoints at proper moment. The number of those forced checkpoints is the main source of failure-free overhead in CIC. In this paper, we present two new CIC protocols which satisfy 'No Z-Cycle (NZC)'property. The proposed protocols reduce the number of forced checkpoints compared to the existing protocols with the drawback of the increase in message delay. Our simulation results with the synthetic data show that the proposed protocols have lower failure-free overhead than the existing protocols. Additionally, we show that the classical 'index-based checkpointing' protocols are inefficient in constructing the consistent global cut in distributed executions.

Harnessing NK cells for cancer immunotherapy: immune checkpoint receptors and chimeric antigen receptors

  • Kim, Nayoung;Lee, Dong-Hee;Choi, Woo Seon;Yi, Eunbi;Kim, HyoJeong;Kim, Jung Min;Jin, Hyung-Seung;Kim, Hun Sik
    • BMB Reports
    • /
    • v.54 no.1
    • /
    • pp.44-58
    • /
    • 2021
  • Natural killer (NK) cells, key antitumor effectors of the innate immune system, are endowed with the unique ability to spontaneously eliminate cells undergoing a neoplastic transformation. Given their broad reactivity against diverse types of cancer and close association with cancer prognosis, NK cells have gained considerable attention as a promising therapeutic target for cancer immunotherapy. NK cell-based therapies have demonstrated favorable clinical efficacies in several hematological malignancies but limited success in solid tumors, thus highlighting the need to develop new therapeutic strategies to restore and optimize anti-tumor activity while preventing tumor immune escape. The current therapeutic modalities yielding encouraging results in clinical trials include the blockade of immune checkpoint receptors to overcome the immune-evasion mechanism used by tumors and the incorporation of tumor-directed chimeric antigen receptors to enhance NK cell anti-tumor specificity and activity. These observations, together with recent advances in the understanding of NK cell activation within the tumor microenvironment, will facilitate the optimal design of NK cell-based therapy against a broad range of cancers and, more desirably, refractory cancers.

The COP9 Signalosome Network in Eukaryotic Microorganisms (진핵 미생물에서의 COP9 signalosome의 역할)

  • Cheon, Yeongmi;Lee, Soojin
    • The Korean Journal of Mycology
    • /
    • v.41 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • COP9 signalosome (CSN), which is originally identified as the regulator of the photomorphogenic development in plant, is highly conserved protein complex in diverse eukaryotic organisms. Most eukaryotic CSN complex is composed of 8 subunits, which is structurally and functionally similar to the lid subunit of 26S proteasome and eIF3 translation initiation complex. CSN play important functions in the regulation of cell cycle and checkpoint response by controlling Cullin-Ring E3 ubiquitin ligases (CRL) activities. CSN exhibits an isopeptidase activity which cleaves the neddylated moiety of cullin components. In fission yeast, S-phase cell cycle progression was delayed and the sensitivity to g-ray or UV was increased in CSN1 and CSN2 deletion mutants, indicating that yeast CSN is also involved in the checkpoint regulation. CSN in fungal system more closely resembles that of the higher organisms in the structure and assembly of their components. Functionally, CSN is associated with the regulation of conidiation rhythms in Neurospora crassa and the sexual development in Aspsergillus nidulans. Recent studies also revealed that CSN functions as an essential cell cycle regulator, playing key roles in the regulation of DNA replication and DNA damage response in Aspergillus. Overall, CSN of microorganisms, such as fission yeast and fungi, share functionally common aspects with higher organisms, implying that they can be useful tools to study the role of CSN in the CRL-mediated diverse cellular activities.

An Efficient Recovery System for Spatial Main Memory DBMS (공간 메인 메모리 DBMS를 위한 효율적인 회복 시스템)

  • Kim, Joung-Joon;Ju, Sung-Wan;Kang, Hong-Koo;Hong, Dong-Sook;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.8 no.3
    • /
    • pp.1-14
    • /
    • 2006
  • Recently, to efficiently support the real-time requirements of LBS and Telematics services, interest in the spatial main memory DBMS is rising. In the spatial main memory DBMS, because all spatial data can be lost when the system failure happens, the recovery system is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery system to reduce disk I/O in the spatial main memory DBMS. In this paper, we study an efficient recovery system for the spatial main memory DBMS. First, the pre-commit log method is used for the decrement of disk I/O and the improvement of transaction concurrency. In addition, we propose the fuzzy-shadow checkpoint method for the recovery system of the spatial main memory DBMS. This method can solve the problem of duplicated disk I/O on the same page of the existing fuzzy-pingpong checkpoint method for the improvement of the whole system performance. Finally, we also report the experimental results confirming the benefit of the proposed recovery system.

  • PDF

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.